Вы находитесь на странице: 1из 702

Junos OS

IS-IS Feature Guide for Routing Devices

Release

15.1

Modified: 2015-06-26

Copyright 2015, Juniper Networks, Inc.

Juniper Networks, Inc.


1133 Innovation Way
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.

Junos OS IS-IS Feature Guide for Routing Devices


15.1
Copyright 2015, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.

END USER LICENSE AGREEMENT


The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (EULA) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.

ii

Copyright 2015, Juniper Networks, Inc.

Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Using the Examples in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Merging a Full Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Merging a Snippet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx

Part 1

Overview

Chapter 1

Introduction to IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IS-IS Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IS-IS Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
ISO Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
IS-IS Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Persistent Route Reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
IS-IS Support for Multipoint Network Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Installing a Default Route to the Nearest Routing Device That Operates at
Both IS-IS Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Supported Standards for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Part 2

Configuring IS-IS

Chapter 2

Configuring a Basic IS-IS Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13


Understanding IS-IS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Example: Configuring IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Understanding IS-IS Areas to Divide an Autonomous System into Smaller
Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Example: Configuring a Multi-Level IS-IS Topology to Control Interarea
Flooding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Understanding IS-IS Designated Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Configuring Designated Router Election Priority for IS-IS . . . . . . . . . . . . . . . . . . . . 29
Configuring an ISO System Identifier for the Router . . . . . . . . . . . . . . . . . . . . . . . . 29

Copyright 2015, Juniper Networks, Inc.

iii

IS-IS Feature Guide for Routing Devices

Chapter 3

Configuring IS-IS Authentication and Checksums . . . . . . . . . . . . . . . . . . . . . 31


Configuring IS-IS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Configuring IS-IS Authentication Without Network-Wide Deployment . . . . . . . . 33
Understanding Hitless Authentication Key Rollover for IS-IS . . . . . . . . . . . . . . . . . 33
Example: Configuring Hitless Authentication Key Rollover for IS-IS . . . . . . . . . . . 34
Understanding Checksums on IS-IS Interfaces for Error Checking . . . . . . . . . . . . 38
Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking . . . 39

Chapter 4

Configuring IS-IS Routing Policy and Route Redistribution . . . . . . . . . . . . . 43


Understanding Routing Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Importing and Exporting Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Active and Inactive Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Explicitly Configured Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Dynamic Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Understanding Backup Selection Policy for IS-IS Protocol . . . . . . . . . . . . . . . . . . 46
Example: Configuring Backup Selection Policy for IS-IS Protocol . . . . . . . . . . . . . 48
Configuring Backup Selection Policy for the IS-IS Protocol . . . . . . . . . . . . . . . . . . 77
Example: Redistributing OSPF Routes into IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1
Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Understanding BGP Communities and Extended Communities as Routing Policy
Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific
Community Tag into IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
IS-IS Extensions to Support Route Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Chapter 5

Configuring IS-IS Bidirectional Forwarding Detection . . . . . . . . . . . . . . . . . 109


Understanding BFD for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Example: Configuring BFD for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Understanding BFD Authentication for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
BFD Authentication Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Security Authentication Keychains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Strict Versus Loose Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring BFD Authentication for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring BFD Authentication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 119
Viewing Authentication Information for BFD Sessions . . . . . . . . . . . . . . . . . 120
Example: Configuring BFD Authentication for IS-IS . . . . . . . . . . . . . . . . . . . . . . . 122

Chapter 6

Configuring IS-IS Multitopology Routing and IPv6 Support . . . . . . . . . . . . 127


IS-IS Multicast Topologies Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Example: Configuring IS-IS Multicast Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses . . . . . . . . . . . 142
Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast
Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Understanding IS-IS IPv4 and IPv6 Unicast Topologies . . . . . . . . . . . . . . . . . . . . 150
Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies . . . . . . . . . . . . . . 150

iv

Copyright 2015, Juniper Networks, Inc.

Table of Contents

Chapter 7

Configuring IS-IS Link and Node Link Protection . . . . . . . . . . . . . . . . . . . . . . 159


Understanding Loop-Free Alternate Routes for IS-IS . . . . . . . . . . . . . . . . . . . . . . 159
Configuring Link Protection for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Configuring Node-Link Protection for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Excluding an IS-IS Interface as a Backup for Protected Interfaces . . . . . . . . 162
Configuring RSVP Label-Switched Paths as Backup Paths for IS-IS . . . . . . 162
Using Operational Mode Commands to Monitor Protected IS-IS Routes . . . 163
Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN . . 163
Understanding Remote LFA over LDP Tunnels in IS-IS Networks . . . . . . . . . . . . . 174
Configuring Remote LFA Backup over LDP Tunnels in an IS-IS Network . . . . . . . 175
Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks . . . . . . . . 177

Chapter 8

Configuring IS-IS Traffic Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189


IS-IS Extensions to Support Traffic Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . 189
IS-IS IGP Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts . . . 190
Example: Enabling IS-IS Traffic Engineering Support . . . . . . . . . . . . . . . . . . . . . . 191
Understanding Forwarding Adjacencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Example: Advertising Label-Switched Paths into IS-IS . . . . . . . . . . . . . . . . . . . . 205
Understanding Wide IS-IS Metrics for Traffic Engineering . . . . . . . . . . . . . . . . . . 213
Example: Enabling Wide IS-IS Metrics for Traffic Engineering . . . . . . . . . . . . . . . 213
Understanding LDP-IGP Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Synchronization Behavior During Graceful Restart . . . . . . . . . . . . . . . . . . . . 216
Synchronization Behavior on LAN Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 217
Synchronization Behavior on IGP Passive Interfaces . . . . . . . . . . . . . . . . . . . 217
Synchronization and TE Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Example: Configuring Synchronization Between IS-IS and LDP . . . . . . . . . . . . . . 217

Chapter 9

Configuring IS-IS Scaling and Throttling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223


Understanding Link-State PDU Throttling for IS-IS Interfaces . . . . . . . . . . . . . . . 223
Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces . . . . 228
Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Understanding IS-IS Mesh Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Example: Configuring Mesh Groups of IS-IS Interfaces . . . . . . . . . . . . . . . . . . . . 234

Chapter 10

Configuring IS-IS CLNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241


Understanding IS-IS for CLNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Example: Configuring IS-IS for CLNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

Chapter 11

Configuring IS-IS on Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245


Introduction to Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Example: Configuring IS-IS on Logical Systems Within the Same Router . . . . . . 247
Understanding Default Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Example: Configuring an IS-IS Default Route Policy on Logical Systems . . . . . . 257

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

Part 3

Monitoring and Troubleshooting Network Issues

Chapter 12

Monitoring Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267


Example: Tracing Global Routing Protocol Operations . . . . . . . . . . . . . . . . . . . . 267

Chapter 13

Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273


Working with Problems on Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Isolating a Broken Network Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Identifying the Symptoms of a Broken Network Connection . . . . . . . . . . . . . . . . 275
Isolating the Causes of a Network Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Taking Appropriate Action for Resolving the Network Problem . . . . . . . . . . . . . . 277
Evaluating the Solution to Check Whether the Network Problem Is Resolved . . 277

Chapter 14

Troubleshooting IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279


Verifying the IS-IS Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Verify the LSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Verify IS-IS Adjacencies and Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Verify the IS-IS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Take Appropriate Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Verify the LSP Again . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Verifying the IS-IS Configuration on a Router in a Network . . . . . . . . . . . . . . . . . 287
Check the Configuration of a Level 1/Level 2 Router . . . . . . . . . . . . . . . . . . . 288
Check the Configuration of a Level 1 Router . . . . . . . . . . . . . . . . . . . . . . . . . 290
Check the Configuration of a Level 2 Router . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Displaying the Status of IS-IS Adjacencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Displaying Detailed IS-IS Protocol Information . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Analyzing IS-IS Link-State PDUs in Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Displaying Sent or Received IS-IS Protocol Packets . . . . . . . . . . . . . . . . . . . . . . 298

Chapter 15

Routing Protocol Process Memory FAQs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301


Routing Protocol Process Memory FAQs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Routing Protocol Process Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Frequently Asked Questions: Routing Protocol Process Memory . . . . . . . . . 302
Frequently Asked Questions: Interpreting Routing Protocol Process-Related
Command Outputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Frequently Asked Questions: Routing Protocol Process Memory
Swapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Frequently Asked Questions: Troubleshooting the Routing Protocol
Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Part 4

Configuration Statements and Operational Commands

Chapter 16

Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311


[edit protocols isis] Hierarchy Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
admin-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
authentication-key (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
authentication-key-chain (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
authentication-type (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
backup-selection (Protocols ISIS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
backup-spf-options (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
bfd-liveness-detection (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

vi

Copyright 2015, Juniper Networks, Inc.

Table of Contents

checksum (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326


clns-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
clns-updown-compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
context-identifier (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
csnp-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
disable (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
disable (LDP Synchronization for IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
export (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
external-preference (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
family (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
graceful-restart (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
hello-authentication-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
hello-authentication-key-chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
hello-authentication-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
hello-interval (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
hello-padding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
hold-time (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
hold-time (LDP Synchronization for IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
ignore-attached-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
ignore-lsp-metrics (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
interface (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
interface (Protocols ISIS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
ipv4-multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
ipv4-multicast-metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
ipv6-multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
ipv6-multicast-metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
ipv6-unicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
ipv6-unicast-metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
isis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
label-switched-path (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
ldp-synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
level (Global IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
level (IS-IS Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
link-protection (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
loose-authentication-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
lsp-equal-cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
lsp-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
lsp-lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
max-areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
max-hello-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
max-lsp-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
max-snp-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
mesh-group (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
metric (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
multicast-rpf-routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
multipath (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
no-adjacency-down-notification (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . 376
no-adjacency-holddown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

Copyright 2015, Juniper Networks, Inc.

vii

IS-IS Feature Guide for Routing Devices

no-authentication-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
no-csnp-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
node-tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
node-link-protection (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
no-eligible-backup (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
no-eligible-remote-backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
no-hello-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
no-ipv4-multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
no-ipv4-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
no-ipv6-multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
no-ipv6-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
no-ipv6-unicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
no-psnp-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
no-unicast-topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
overload (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
passive (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
point-to-point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
preference (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
prefix-export-limit (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
priority (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
reference-bandwidth (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
remote-backup-calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
rib-group (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
routing-instances (Multiple Routing Entities) . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
shortcuts (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
spf-options (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
static-host-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
te-metric (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
topologies (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
traceoptions (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
traffic-engineering (Protocols IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
wide-metrics-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416

Chapter 17

Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417


clear bfd adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
clear bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
clear isis adjacency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
clear isis database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
clear isis overload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
clear isis statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
ping clns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
show bfd session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
show isis adjacency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
show isis adjacency holddown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
show isis authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
show isis backup coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

viii

Copyright 2015, Juniper Networks, Inc.

Table of Contents

show isis backup label-switched-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461


show backup-selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
show isis backup spf results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
show isis context-identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
show isis database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
show isis hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
show isis interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
show isis overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
show isis route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
show isis spf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
show isis statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
show policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
show policy conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
show route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
show route active-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
show route advertising-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
show route all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
show route best . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
show route brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
show route detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
show route exact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
show route export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
show route extensive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
show route forwarding-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
show route hidden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
show route inactive-path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
show route instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
show route next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
show route output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
show route protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
show route receive-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
show route table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
show route terse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
show security keychain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
test policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
traceroute clns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

Part 5

Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675

Copyright 2015, Juniper Networks, Inc.

ix

IS-IS Feature Guide for Routing Devices

Copyright 2015, Juniper Networks, Inc.

List of Figures
Part 1

Overview

Chapter 1

Introduction to IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Figure 1: Install Default Route to Nearest Routing Device That Operates at Both
Level 1 and Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Part 2

Configuring IS-IS

Chapter 2

Configuring a Basic IS-IS Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13


Figure 2: Simple IS-IS Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Figure 3: IS-IS Multi-Level Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Chapter 3

Configuring IS-IS Authentication and Checksums . . . . . . . . . . . . . . . . . . . . . 31


Figure 4: Hitless Authentication Key Rollover for IS-IS . . . . . . . . . . . . . . . . . . . . . . 35
Figure 5: IS-IS Checksum Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Chapter 4

Configuring IS-IS Routing Policy and Route Redistribution . . . . . . . . . . . . . 43


Figure 6: Importing and Exporting Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Figure 7: Backup Selection Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Figure 8: IS-IS Route Redistribution Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Figure 9: Route Leaking from a Level 2 Area to a Level 1 Area . . . . . . . . . . . . . . . . 92
Figure 10: Redistributing BGP Routes with a Specific Community Tag into
IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Chapter 5

Configuring IS-IS Bidirectional Forwarding Detection . . . . . . . . . . . . . . . . . 109


Figure 11: Configuring BFD for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Figure 12: IS-IS BFD Authentication Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

Chapter 6

Configuring IS-IS Multitopology Routing and IPv6 Support . . . . . . . . . . . . 127


Figure 13: Configuring IS-IS Multicast Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Figure 14: IS-IS IPv4 and IPv6 Dual Stacking Topology . . . . . . . . . . . . . . . . . . . . . 145
Figure 15: IS-IS IPv4 and IPv6 Unicast Topologies . . . . . . . . . . . . . . . . . . . . . . . . . 152

Chapter 7

Configuring IS-IS Link and Node Link Protection . . . . . . . . . . . . . . . . . . . . . . 159


Figure 16: Link Protection and Node-Link Protection Comparison for IS-IS
Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Figure 17: IS-IS Node-Link Protection Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Figure 18: Configuring Remote LFA over LDP Tunnels in IS-IS Networks . . . . . . . 178

Chapter 8

Configuring IS-IS Traffic Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189


Figure 19: Typical SPF Tree, Sourced from Router A . . . . . . . . . . . . . . . . . . . . . . . 190
Figure 20: Modified SPF Tree, Using LSP AD as a Shortcut . . . . . . . . . . . . . . . . 190
Figure 21: Modified SPF Tree, Using LSP AD and LSP AE as Shortcuts . . . . . . . 191

Copyright 2015, Juniper Networks, Inc.

xi

IS-IS Feature Guide for Routing Devices

Figure 22: IS-IS Shortcuts Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192


Figure 23: IS-IS Advertising a Label-Switched Path Topology . . . . . . . . . . . . . . . 206
Figure 24: IS-IS Wide Metrics Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Figure 25: IS-IS and LDP Synchronization Topology . . . . . . . . . . . . . . . . . . . . . . . 218

Chapter 9

Configuring IS-IS Scaling and Throttling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223


Figure 26: IS-IS Link-State PDU Interval Topology . . . . . . . . . . . . . . . . . . . . . . . . 224
Figure 27: IS-IS CSNP Interval Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Figure 28: IS-IS Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

Chapter 11

Configuring IS-IS on Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245


Figure 29: Logical Systems Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Figure 30: Junos OS Without Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Figure 31: Junos OS with Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Figure 32: IS-IS on Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Figure 33: IS-IS Logical Systems with a Default Route to an ISP . . . . . . . . . . . . . 258

Part 3

Monitoring and Troubleshooting Network Issues

Chapter 13

Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273


Figure 34: Process for Diagnosing Problems in Your Network . . . . . . . . . . . . . . . 274
Figure 35: Network with a Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

Chapter 14

Troubleshooting IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279


Figure 36: MPLS Network Broken at the IS-IS Protocol Layer . . . . . . . . . . . . . . . 279
Figure 37: Levels in an IS-IS Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Figure 38: IS-IS Network Topology with Details . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Figure 39: IS-IS Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294

xii

Copyright 2015, Juniper Networks, Inc.

List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii

Part 2

Configuring IS-IS

Chapter 5

Configuring IS-IS Bidirectional Forwarding Detection . . . . . . . . . . . . . . . . . 109


Table 3: Configuring BFD for IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Chapter 6

Configuring IS-IS Multitopology Routing and IPv6 Support . . . . . . . . . . . . 127


Table 4: IPv4 Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Table 5: IPv6 Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Table 6: Choosing the Right Solution to Address Next-Generation Addressing
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

Part 3

Monitoring and Troubleshooting Network Issues

Chapter 13

Troubleshooting Network Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273


Table 7: Checklist for Working with Problems on Your Network . . . . . . . . . . . . . . 273

Chapter 14

Troubleshooting IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279


Table 8: IS-IS Protocol Tracing Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

Chapter 15

Routing Protocol Process Memory FAQs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301


Table 9: show system processes extensive Output Fields . . . . . . . . . . . . . . . . . . 304
Table 10: show task memory Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305

Part 4

Configuration Statements and Operational Commands

Chapter 16

Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311


Table 11: Default Metric Values for Routes Exported into IS-IS . . . . . . . . . . . . . . . 373

Chapter 17

Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417


Table 12: show bfd session Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Table 13: show isis adjacency Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Table 14: show isis authentication Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 457
Table 15: show isis backup coverage Output Fields . . . . . . . . . . . . . . . . . . . . . . . 459
Table 16: show isis backup label-switched-path Output Fields . . . . . . . . . . . . . . 461
Table 17: show backup-selection Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Table 18: show isis backup spf results Output Fields . . . . . . . . . . . . . . . . . . . . . . . 471
Table 19: show isis context-identifier Output Fields . . . . . . . . . . . . . . . . . . . . . . . 473
Table 20: show isis database Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Table 21: show isis hostname Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487

Copyright 2015, Juniper Networks, Inc.

xiii

IS-IS Feature Guide for Routing Devices

Table 22: show isis interface Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490


Table 23: show isis overview Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Table 24: show isis route Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Table 25: show isis spf Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Table 26: show isis statistics Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Table 27: show policy Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Table 28: show policy conditions Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Table 29: show route Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Table 30: show route advertising-protocol Output Fields . . . . . . . . . . . . . . . . . . 525
Table 31: show route detail Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Table 32: Next-hop Types Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Table 33: State Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Table 34: Communities Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Table 35: show route export Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Table 36: show route extensive Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Table 37: show route forwarding-table Output Fields . . . . . . . . . . . . . . . . . . . . . 580
Table 38: show route instance Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Table 39: show route receive-protocol Output Fields . . . . . . . . . . . . . . . . . . . . . 630
Table 40: show route table Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Table 41: Next-hop Types Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . 644
Table 42: State Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Table 43: Communities Output Field Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Table 44: show route terse Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Table 45: show security keychain Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 666
Table 46: Traceroute clns Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

xiv

Copyright 2015, Juniper Networks, Inc.

About the Documentation

Documentation and Release Notes on page xv

Supported Platforms on page xv

Using the Examples in This Manual on page xv

Documentation Conventions on page xvii

Documentation Feedback on page xix

Requesting Technical Support on page xix

Documentation and Release Notes

To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.

Supported Platforms
For the features described in this document, the following platforms are supported:

ACX Series

T Series

MX Series

SRX Series

M Series

Using the Examples in This Manual


If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming

Copyright 2015, Juniper Networks, Inc.

xv

IS-IS Feature Guide for Routing Devices

configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.

Merging a Full Example


To merge a full example, follow these steps:
1.

From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}

2. Merge the contents of the file into your routing platform configuration by issuing the

load merge configuration mode command:


[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete

Merging a Snippet
To merge a snippet, follow these steps:
1.

From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.

xvi

Copyright 2015, Juniper Networks, Inc.

About the Documentation

commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following

configuration mode command:


[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the

load merge relative configuration mode command:


[edit system scripts]
user@host# load merge relative /var/tmp/ex-script-snippet.conf
load complete

For more information about the load command, see the CLI User Guide.

Documentation Conventions
Table 1 on page xvii defines notice icons used in this guide.

Table 1: Notice Icons


Icon

Meaning

Description

Informational note

Indicates important features or instructions.

Caution

Indicates a situation that might result in loss of data or hardware damage.

Warning

Alerts you to the risk of personal injury or death.

Laser warning

Alerts you to the risk of personal injury from a laser.

Tip

Indicates helpful information.

Best practice

Alerts you to a recommended use or implementation.

Table 2 on page xviii defines the text and syntax conventions used in this guide.

Copyright 2015, Juniper Networks, Inc.

xvii

IS-IS Feature Guide for Routing Devices

Table 2: Text and Syntax Conventions


Convention

Description

Examples

Bold text like this

Represents text that you type.

To enter configuration mode, type the


configure command:
user@host> configure

Fixed-width text like this

Italic text like this

Italic text like this

Represents output that appears on the


terminal screen.

user@host> show chassis alarms

Introduces or emphasizes important


new terms.

Identifies guide names.

A policy term is a named structure


that defines match conditions and
actions.

Identifies RFC and Internet draft titles.

Junos OS CLI User Guide

RFC 1997, BGP Communities Attribute

No alarms currently active

Represents variables (options for which


you substitute a value) in commands or
configuration statements.

Configure the machines domain name:

Represents names of configuration


statements, commands, files, and
directories; configuration hierarchy levels;
or labels on routing platform
components.

To configure a stub area, include the


stub statement at the [edit protocols
ospf area area-id] hierarchy level.

The console port is labeled CONSOLE.

< > (angle brackets)

Encloses optional keywords or variables.

stub <default-metric metric>;

| (pipe symbol)

Indicates a choice between the mutually


exclusive keywords or variables on either
side of the symbol. The set of choices is
often enclosed in parentheses for clarity.

broadcast | multicast

# (pound sign)

Indicates a comment specified on the


same line as the configuration statement
to which it applies.

rsvp { # Required for dynamic MPLS only

[ ] (square brackets)

Encloses a variable for which you can


substitute one or more values.

community name members [


community-ids ]

Indention and braces ( { } )

Identifies a level in the configuration


hierarchy.

; (semicolon)

Identifies a leaf statement at a


configuration hierarchy level.

Text like this

[edit]
root@# set system domain-name
domain-name

(string1 | string2 | string3)

[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}

GUI Conventions

xviii

Copyright 2015, Juniper Networks, Inc.

About the Documentation

Table 2: Text and Syntax Conventions (continued)


Convention

Description

Examples

Bold text like this

Represents graphical user interface (GUI)


items you click or select.

In the Logical Interfaces box, select


All Interfaces.

To cancel the configuration, click


Cancel.

> (bold right angle bracket)

Separates levels in a hierarchy of menu


selections.

In the configuration editor hierarchy,


select Protocols>Ospf.

Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:

Online feedback rating systemOn any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.

E-mailSend your comments to techpubs-comments@juniper.net. Include the document


or topic name, URL or page number, and software version (if applicable).

Requesting Technical Support


Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.

JTAC policiesFor a complete understanding of our JTAC procedures and policies,


review the JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.

Product warrantiesFor product warranty information, visit


http://www.juniper.net/support/warranty/.

JTAC hours of operationThe JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.

Self-Help Online Tools and Resources


For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:

Copyright 2015, Juniper Networks, Inc.

xix

IS-IS Feature Guide for Routing Devices

Find CSC offerings: http://www.juniper.net/customers/support/

Search for known bugs: http://www2.juniper.net/kb/

Find product documentation: http://www.juniper.net/techpubs/

Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/

Download the latest versions of software and review release notes:


http://www.juniper.net/customers/csc/software/

Search technical bulletins for relevant hardware and software notifications:


http://kb.juniper.net/InfoCenter/

Join and participate in the Juniper Networks Community Forum:


http://www.juniper.net/company/communities/

Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/

To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/

Opening a Case with JTAC


You can open a case with JTAC on the Web or by telephone.

Use the Case Management tool in the CSC at http://www.juniper.net/cm/.

Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).

For international or direct-dial options in countries without toll-free numbers, see


http://www.juniper.net/support/requesting-support.html.

xx

Copyright 2015, Juniper Networks, Inc.

PART 1

Overview

Introduction to IS-IS on page 3

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

Copyright 2015, Juniper Networks, Inc.

CHAPTER 1

Introduction to IS-IS

IS-IS Overview on page 3

Supported Standards for IS-IS on page 8

IS-IS Overview
The IS-IS protocol is an interior gateway protocol (IGP) that uses link-state information
to make routing decisions.
IS-IS is a link-state IGP that uses the shortest-path-first (SPF) algorithm to determine
routes. IS-IS evaluates the topology changes and determines whether to perform a full
SPF recalculation or a partial route calculation (PRC). This protocol originally was
developed for routing International Organization for Standardization (ISO) Connectionless
Network Protocol (CLNP) packets.
Like OSPF routing, IS-IS uses hello packets that allow network convergence to occur
quickly when network changes are detected. IS-IS uses the SPF algorithm to determine
routes. Using SPF, IS-IS evaluates network topology changes and determines if a full or
partial route calculation is required.

NOTE: Because IS-IS uses ISO addresses, the configuration of IP version 6


(IPv6) and IP version 4 (IPv4) implementations of IS-IS is identical.

NOTE: See Platforms/FPCs That Cannot Forward TCC Encapsulated ISO


Traffic to find a list of those devices and FPC configurations that cannot pass
ISO traffic when encapsulated in TCC format.

This section discusses the following topics:

IS-IS Terminology on page 4

ISO Network Addresses on page 4

IS-IS Packets on page 6

Persistent Route Reachability on page 7

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

IS-IS Support for Multipoint Network Clouds on page 7

Installing a Default Route to the Nearest Routing Device That Operates at Both IS-IS
Levels on page 7

IS-IS Terminology
An IS-IS network is a single autonomous system (AS), also called a routing domain, that
consists of end systems and intermediate systems. End systems are network entities that
send and receive packets. Intermediate systems send and receive packets and relay
(forward) packets. (Intermediate system is the Open System Interconnection [OSI] term
for a router.) ISO packets are called network PDUs.
In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into
smaller areas. This organization is accomplished by configuring Level 1 and Level 2
intermediate systems. Level 1 systems route within an area; when the destination is
outside an area, they route toward a Level 2 system. Level 2 intermediate systems route
between areas and toward other ASs. No IS-IS area functions strictly as a backbone.
Level 1 routers share intra-area routing information, and Level 2 routers share interarea
information about IP addresses available within each area. Uniquely, IS-IS routers can
act as both Level 1 and Level 2 routers, sharing intra-area routes with other Level 1 routers
and interarea routes with other Level 2 routers.
The propagation of link-state updates is determined by the level boundaries. All routers
within a level maintain a complete link-state database of all other routers in the same
level. Each router then uses the Dijkstra algorithm to determine the shortest path from
the local router to other routers in the link-state database.

ISO Network Addresses


IS-IS uses ISO network addresses. Each address identifies a point of connection to the
network, such as a router interface, and is called a network service access point (NSAP).
IS-IS supports multiple NSAP addresses on the loopback lo0 interface.
An end system can have multiple NSAP addresses, in which case the addresses differ
only by the last byte (called the n-selector). Each NSAP represents a service that is
available at that node. In addition to having multiple services, a single node can belong
to multiple areas.
Each network entity also has a special network address called a network entity title (NET).
Structurally, an NET is identical to an NSAP address but has an n-selector of 00. Most
end systems and intermediate systems have one NET. Intermediate systems that
participate in multiple areas can have multiple NETs.
The following ISO addresses illustrate the IS-IS address format:
49.0001.00a0.c96b.c490.00
49.0001.2081.9716.9018.00

NETs take several forms, depending on your network requirements. NET addresses are
hexadecimal and range from 8 octets to 20 octets in length. Generally, the format consists

Copyright 2015, Juniper Networks, Inc.

Chapter 1: Introduction to IS-IS

of an authority and format Identifier (AFI), a domain ID, an area ID, a system identifier,
and a selector. The simplest format omits the domain ID and is 10 octets long. For
example, the NET address 49.0001.1921.6800.1001.00 consists of the following parts:

49AFI

0001Area ID

1921.6800.1001System identifier

00Selector

The system identifier must be unique within the network. For an IP-only network, we
recommend using the IP address of an interface on the router. Configuring a loopback
NET address with the IP address is helpful when troubleshooting is required on the
network.
The first portion of the address is the area number, which is a variable number from 1
through 13 bytes. The first byte of the area number (49) is the authority and format
indicator (AFI). The next bytes are the assigned domain (area) identifier, which can be
from 0 through 12 bytes. In the examples above, the area identifier is 0001.
The next six bytes form the system identifier. The system identifier can be any six bytes
that are unique throughout the entire domain. The system identifier commonly is the
media access control (MAC) address (as in the first example, 00a0.c96b.c490) or the
IP address expressed in binary-coded decimal (BCD) (as in the second example,
2081.9716.9018, which corresponds to IP address 208.197.169.18). The last byte (00) is
the n-selector.

NOTE: The system identifier cannot be 0000.0000.0000. All 0s is an illegal


setting, and the adjacency is not formed with this setting.

To provide help with IS-IS debugging, the Junos operating system (Junos OS) supports
dynamic mapping of ISO system identifiers to the hostname. Each system can be
configured with a hostname, which allows the system identifier-to-hostname mapping
to be carried in a dynamic hostname type, length, and value (TLV) tuple in IS-IS link-state
PDUs. This enables intermediate systems in the routing domain to learn about the ISO
system identifier of a particular intermediate system.

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

IS-IS Packets
Each IS-IS PDU shares a common header. IS-IS uses the following PDUs to exchange
protocol information:

IS-IS hello (IIH) PDUsBroadcast to discover the identity of neighboring IS-IS systems
and to determine whether the neighbors are Level 1 or Level 2 intermediate systems.
IS-IS hello PDUs establish adjacencies with other routers and have three different
formats: one for point-to-point hello packets, one for Level 1 broadcast links, and one
for Level 2 broadcast links. Level 1 routers must share the same area address to form
an adjacency, while Level 2 routers do not have this limitation. The request for adjacency
is encoded in the Circuit type field of the PDU.
Hello PDUs have a preset length assigned to them. The IS-IS router does not resize
any PDU to match the maximum transmission unit (MTU) on a router interface. Each
interface supports the maximum IS-IS PDU of 1492 bytes, and hello PDUs are padded
to meet the maximum value. When the hello is sent to a neighboring router, the
connecting interface supports the maximum PDU size.

Link-state PDUsContain information about the state of adjacencies to neighboring


IS-IS systems. Link-state PDUs are flooded periodically throughout an area.
Also included is metric and IS-IS neighbor information. Each link-state PDU must be
refreshed periodically on the network and is acknowledged by information within a
sequence number PDU.
On point-to-point links, each link-state PDU is acknowledged by a partial sequence
number PDU (PSNP), but on broadcast links, a complete sequence number PDU
(CSNP) is sent out over the network. Any router that finds newer link-state PDU
information in the CSNP then purges the out-of-date entry and updates the link-state
database.
Link-state PDUs support variable-length subnet mask addressing.

Complete sequence number PDUs (CSNPs)Contain a complete list of all link-state


PDUs in the IS-IS database. CSNPs are sent periodically on all links, and the receiving
systems use the information in the CSNP to update and synchronize their link-state
PDU databases. The designated router multicasts CSNPs on broadcast links in place
of sending explicit acknowledgments for each link-state PDU.
Contained within the CSNP is a link-state PDU identifier, a lifetime, a sequence number,
and a checksum for each entry in the database. Periodically, a CSNP is sent on both
broadcast and point-to-point links to maintain a correct database. Also, the
advertisement of CSNPs occurs when an adjacency is formed with another router. Like
IS-IS hello PDUs, CSNPs come in two types: Level 1 and Level 2.
When a device receives a CSNP, it checks the database entries against its own local
link-state database. If it detects missing information, the device requests specific
link-state PDU details using a partial sequence number PDU (PSNP).

Partial sequence number PDUs (PSNPs)Sent multicast by a receiver when it detects


that it is missing a link-state PDU (when its link-state PDU database is out of date).
The receiver sends a PSNP to the system that transmitted the CSNP, effectively

Copyright 2015, Juniper Networks, Inc.

Chapter 1: Introduction to IS-IS

requesting that the missing link-state PDU be transmitted. That routing device, in turn,
forwards the missing link-state PDU to the requesting routing device.
A PSNP is used by an IS-IS router to request link-state PDU information from a
neighboring router. A PSNP can also explicitly acknowledge the receipt of a link-state
PDU on a point-to-point link. On a broadcast link, a CSNP is used as implicit knowledge.
Like hello PDUs and CSNPs, the PSNP also has two types: Level 1 and Level 2.
When a device compares a CSNP to its local database and determines that a link-state
PDU is missing, the router issues a PSNP for the missing link-state PDU, which is returned
in a link-state PDU from the router sending the CSNP. The received link-state PDU is
then stored in the local database, and an acknowledgment is sent back to the originating
router.

Persistent Route Reachability


IPv4 and IPv6 route reachability information in IS-IS link-state PDUs is preserved when
you commit a configuration. IP prefixes are preserved with their original packet fragment
upon link-state PDU regeneration.

IS-IS Support for Multipoint Network Clouds


IS-IS does not support multipoint configurations. Therefore, when configuring Frame
Relay or Asynchronous Transfer Mode (ATM) networks, you must configure them as
collections of point-to-point links, not as multipoint clouds.

Installing a Default Route to the Nearest Routing Device That Operates at Both IS-IS Levels
When a routing device that operates as both a Level 1 and Level 2 router (Router B)
determines that it can reach at least one area other than its own (for example, in Area
Y), it sets the ATTACHED bit in its Level 1 link-state PDU. Thereafter, the Level 1 router
(Router A) introduces a default route pointing to the nearest attached routing device
that operates as both a Level 1 and Level 2 router (Router B). See Figure 1 on page 7.

Figure 1: Install Default Route to Nearest Routing Device That Operates


at Both Level 1 and Level 2

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

Related
Documentation

IS-IS Feature Guide for Routing Devices

Supported Standards for IS-IS


Junos OS substantially supports the following standards for IS-IS.

International Organization for Standardization/International Electrotechnical


Commission (ISO/IEC) 8473, Information technology Protocol for providing the
connectionless-mode network service

ISO 9542, End System to Intermediate System Routing Exchange Protocol for Use in
Conjunction with the Protocol for the Provision of the Connectionless-mode Network
Service

ISO/IEC 10589, Information technology Telecommunications and information exchange


between systems Intermediate System to Intermediate System intra-domain routeing
information exchange protocol for use in conjunction with the protocol for providing the
connectionless-mode network service (ISO 8473)

RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments

RFC 3719, Recommendations for Interoperable Networks using Intermediate System to


Intermediate System (IS-IS)

RFC 3847, Restart Signaling for Intermediate System to Intermediate System (IS-IS)

RFC 5120, M-ISIS: Multi Topology (MT) Routing in Intermediate System to Intermediate
Systems (IS-ISs)

RFC 5130, A Policy Control Mechanism in IS-IS Using Administrative Tags

RFC 5286, Basic Specification for IP Fast Reroute: Loop-Free Alternates

RFC 5301, Dynamic Hostname Exchange Mechanism for IS-IS

RFC 5302, Domain-Wide Prefix Distribution with Two-Level IS-IS

RFC 5303, Three-Way Handshake for IS-IS Point-to-Point Adjacencies

RFC 5304, IS-IS Cryptographic Authentication

RFC 5305, IS-IS Extensions for Traffic Engineering

RFC 5306, Restart Signaling for IS-IS

RFC 5307, IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching


(GMPLS)

RFC 5308, Routing IPv6 with IS-IS

RFC 5310, IS-IS Generic Cryptographic Authentication

RFC 5880, Bidirectional Forwarding Detection (BFD)

Copyright 2015, Juniper Networks, Inc.

Chapter 1: Introduction to IS-IS

The following RFCs do not define standards, but provide information about IS-IS and
related technologies. The IETF classifies them as Informational.

Related
Documentation

RFC 2973, IS-IS Mesh Groups

RFC 3358, Optional Checksums in Intermediate System to Intermediate System (ISIS)

RFC 3359, Reserved Type, Length and Value (TLV) Codepoints in Intermediate System
to Intermediate System

RFC 3373, Three-Way Handshake for Intermediate System to Intermediate System (IS-IS)
Point-to-Point Adjacencies

RFC 3567, Intermediate System to Intermediate System (IS-IS) Cryptographic


Authentication

RFC 3787, Recommendations for Interoperable IP Networks using Intermediate System


to Intermediate System (IS-IS)

RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols

Internet draft draft-ietf-isis-wg-255adj-02.txt, Maintaining more than 255 circuits in


IS-IS

IS-IS Overview on page 3

Supported ES-IS Standards

Accessing Standards Documents on the Internet

Copyright 2015, Juniper Networks, Inc.

IS-IS Feature Guide for Routing Devices

10

Copyright 2015, Juniper Networks, Inc.

PART 2

Configuring IS-IS

Configuring a Basic IS-IS Network on page 13

Configuring IS-IS Authentication and Checksums on page 31

Configuring IS-IS Routing Policy and Route Redistribution on page 43

Configuring IS-IS Bidirectional Forwarding Detection on page 109

Configuring IS-IS Multitopology Routing and IPv6 Support on page 127

Configuring IS-IS Link and Node Link Protection on page 159

Configuring IS-IS Traffic Engineering on page 189

Configuring IS-IS Scaling and Throttling on page 223

Configuring IS-IS CLNS on page 241

Configuring IS-IS on Logical Systems on page 245

Copyright 2015, Juniper Networks, Inc.

11

IS-IS Feature Guide for Routing Devices

12

Copyright 2015, Juniper Networks, Inc.

CHAPTER 2

Configuring a Basic IS-IS Network

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Understanding IS-IS Areas to Divide an Autonomous System into Smaller


Groups on page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea


Flooding on page 20

Understanding IS-IS Designated Routers on page 28

Configuring Designated Router Election Priority for IS-IS on page 29

Configuring an ISO System Identifier for the Router on page 29

Understanding IS-IS Configuration


To configure IS-IS, you must enable IS-IS on the interfaces and configure a NET address
on one of the device interfaces (preferably, the lo0 interface) by setting family iso address
net-address on the interface. To create the NET address (also known as the system ID
or the NSAP address), you can use the convention that is dictated by your network design,
or you can follow this convention:
1.

Take the router ID, remove the dots (.), and insert leading zeroes where necessary so
that the string is 12 characters long.
For example, if the router ID is 192.168.0.4, the 12-character string would be
192168000004. If the router ID is 10.12.23.1, the 12-character string would be
010012023001.

2. Add a dot after every 4th character.

The strings would become 1921.6800.0004 and 0100.1202.3001.


3. Prepend the area number.

If the routing devices are in area 47, the strings would become 47.1921.6800.0004
and 47.0100.1202.3001.
4. Append the selector (00).

The strings would become 47.1921.6800.0004.00 and 47.0100.1202.3001.00.

Copyright 2015, Juniper Networks, Inc.

13

IS-IS Feature Guide for Routing Devices

You must configure the ISO family on all interfaces that are supporting the IS-IS protocol
by setting family iso on the interface. This means that IS-IS related frames are not
discarded by the routing devices.
You must enable IS-IS to run on the interfaces by setting interface interface-name in the
protocol configuration. This means that the interfaces are advertised into IS-IS.
Unlike OSPF, when you enable IS-IS on the lo0 interface, you do not need to explicitly
set passive mode. Passive mode means that the interface is advertised into the link-state
protocol, but the interface does not send or receive protocol control packets, such as
IS-IS hello and link-state PDUs. In IS-IS, the lo0 interface is always passive.
When you enable IS-IS on an interface, both levels (Level 1 and Level 2) are enabled by
default. To specify that an interface is on a Level 1 link, disable Level 2. To specify that
an interface is on a Level 2 link, disable Level 1. You can disable a level on the entire device
or per-interface. If two routing devices, R1 and R2, are both in the same IS-IS area, they
communicate at Level 1 if one or both devices have Level 2 disabled.
For security devices only, you must enable IS-IS by setting mode packet-based at the
[edit security forwarding-options family iso] hierarchy level.
Related
Documentation

Example: Configuring IS-IS on page 14

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring IS-IS


This example shows how to configure IS-IS.

Requirements on page 14

Overview on page 14

Configuration on page 15

Verification on page 17

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
In this example, you configure the two IS-IS routing devices in a single area. The devices
have NET addresses 49.0002.0192.0168.0001.00 and 49.0002.0192.0168.0002.00 on
the lo0 interfaces. Additionally, you configure the ISO family on the IS-IS interfaces.
For Junos OS security devices only, you configure the mode packet-based statement at
the [edit security forwarding-options family iso] hierarchy level.

14

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

Figure 2 on page 15 shows the topology used in this example.

Figure 2: Simple IS-IS Topology


10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

CLI Quick Configuration on page 15 shows the configuration for both of the devices in
Figure 2 on page 15. The section Step-by-Step Procedure on page 15 describes the
steps on Device R1.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

set security forwarding-options family iso mode packet-based


set interfaces ge-1/2/0 unit 0 description to-R2
set interfaces ge-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces ge-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols isis interface ge-1/2/0.0
set protocols isis interface lo0.0

Device R2

set security forwarding-options family iso mode packet-based


set interfaces ge-1/2/0 unit 0 description to-R1
set interfaces ge-1/2/0 unit 0 family inet address 10.0.0.2/30
set interfaces ge-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set protocols isis interface ge-1/2/0.0
set protocols isis interface lo0.0

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS:
1.

Enable IS-IS if your router is in secure context.


[edit security forwarding-options family iso]
user@R1# set mode packet-based

2.

Create the interface that connects to Device R2, and configure the ISO family on
the interface.
[edit interfaces ge-1/2/0 unit 0]
user@R1# set description to-R2

Copyright 2015, Juniper Networks, Inc.

15

IS-IS Feature Guide for Routing Devices

user@R1# set family inet address 10.0.0.1/30


user@R1# set family iso
3.

Create the loopback interface, set the IP address, and set the NET address.
[edit interfaces lo0 unit 0]
user@R1# set family inet address 192.168.0.1/32
user@R1# set family iso address 49.0002.0192.0168.0001.00

4.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@R1# set interface ge-1/2/0.0
user@R1# set interface lo0.0

Results

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show security commands. If the output does not display the intended
configuration, repeat the instructions in this example to correct the configuration.
user@R1# show security
forwarding-options {
family iso {
mode packet-based;
}
}
user@R1# show interfaces
ge-1/2/0 {
unit 0 {
description to-R2;
family inet {
address 10.0.0.1/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
user@R1# show protocols
isis {
interface ge-1/2/0.0;
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode.

16

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

Verification
Confirm that the configuration is working properly.

Verifying IS-IS Interface Configuration on page 17

Verifying IS-IS Interface Configuration in Detail on page 17

Verifying IS-IS Adjacencies on page 18

Verifying IS-IS Adjacencies in Detail on page 18

Verifying IS-IS Interface Configuration


Purpose
Action

Verify the status of the IS-IS-enabled interfaces.


From operational mode, enter the show isis interface brief command.
user@R1> show isis interface brief
IS-IS interface database:
Interface
L CirID Level 1 DR
lo0.0
3
0x1 Passive
ge-1/2/0.0
3
0x1 R2.02

Meaning

Level 2 DR
Passive
R2.02

L1/L2 Metric
0/0
10/10

Verify that the output shows the intended configuration of the interfaces on which IS-IS
is enabled.

Verifying IS-IS Interface Configuration in Detail


Purpose
Action

Verify the details of IS-IS-enabled interfaces.


From operational mode, enter the show isis interface detail command.
user@R1> show isis interface detail
IS-IS interface database:
lo0.0
Index: 75, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated
1
0
64
0 Passive
2
0
64
0 Passive
ge-1/2/0.0
Index: 77, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated
1
1
64
10
9.000
27 R2.02 (not
2
1
64
10
9.000
27 R2.02 (not

Meaning

Router

Router
us)
us)

Check the following output fields and verify that the output shows the intended
configuration of IS-IS-enabled interfaces:

InterfaceInterface configured for IS-IS.

StateInternal implementation information.

Circuit idCircuit identifier.

Copyright 2015, Juniper Networks, Inc.

17

IS-IS Feature Guide for Routing Devices

Circuit typeConfigured level of IS-IS:

1Level 1 only

2Level 2 only

3Level 1 and Level 2

link-state PDU intervalTime between IS-IS information messages.

L or LevelType of adjacency:

1Level 1 only

2Level 2 only

3Level 1 and Level 2

AdjacenciesAdjacencies established on the interface.

PriorityPriority value established on the interface.

MetricMetric value for the interface.

Hello(s)Intervals between hello PDUs.

Hold(s)Hold time on the interface.

Verifying IS-IS Adjacencies


Purpose
Action

Display brief information about IS-IS neighbors.


From operational mode, enter the show isis adjacency brief command.
user@R1> show isis adjacency brief
Interface
System
ge-1/2/0.0
R2
ge-1/2/0.0
R2

Meaning

1
2

L State
Up
Up

Hold (secs) SNPA


6 0:5:85:8f:c8:bd
6 0:5:85:8f:c8:bd

Verify the adjacent routers in the IS-IS database.

Verifying IS-IS Adjacencies in Detail


Purpose
Action

Display extensive information about IS-IS neighbors.


From operational mode, enter the show isis adjacency extensive command.
user@R1> show isis adjacency extensive
R2
Interface: ge-1/2/0.0, Level: 1, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 00:40:28 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.0.2
Transition log:
When
State
Event
Down reason
Thu May 31 11:18:48
Up
Seenself

18

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

R2
Interface: ge-1/2/0.0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 00:40:28 ago
Circuit type: 3, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.0.2
Transition log:
When
State
Event
Down reason
Thu May 31 11:18:48
Up
Seenself

Meaning

Check the following fields and verify the adjacency information about IS-IS neighbors:

InterfaceInterface through which the neighbor is reachable.

L or LevelConfigured level of IS-IS:

1Level 1 only

2Level 2 only

3Level 1 and Level 2

An exclamation point before the level number indicates that the adjacency is missing
an IP address.

Related
Documentation

StateStatus of the adjacency: Up, Down, New, One-way, Initializing, or Rejected.

EventMessage that identifies the cause of a state.

Down reasonReason the adjacency is down.

Restart capableA neighbor is configured for graceful restart.

Transition logList of transitions including When, State, and Reason.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS for GRES with Graceful Restart

Configuring Designated Router Election Priority for IS-IS on page 29

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups


In IS-IS, a single AS can be divided into smaller groups called areas.
Link-state protocols cannot scale well if a large autonomous system (AS) consists of a
single set of routing devices that all share a common database to compute the best
paths through the AS. Because the shortest-path-first (SPF) algorithm works in an
exponential fashion, the CPU demand can become too heavy when too many routing
devices share their complete routing information with each other. To alleviate this issue,
large ASs are divided into smaller parts called areas.
When ASs are split into areas, the disjointed areas must be connected to route traffic
between the areas. Reachability information at the area borders must be injected into
each other areas.

Copyright 2015, Juniper Networks, Inc.

19

IS-IS Feature Guide for Routing Devices

In IS-IS, routing between areas is organized hierarchically. This organization is


accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1 systems
route within an area. When the destination is outside an area, Level 1 systems route
toward a Level 2 system. Level 2 intermediate systems route between areas and toward
other ASs. No IS-IS area functions strictly as a backbone.
Level 1 routers share intra-area routing information, and Level 2 routers share interarea
information about IP addresses available within each area. Uniquely, IS-IS routers can
act as both Level 1 and Level 2 routers, sharing intra-area routes with other Level 1 routers
and interarea routes with other Level 2 routers.
The propagation of link-state updates is determined by the level boundaries. All routers
within a level maintain a complete link-state database of all other routers in the same
level. Each router then uses the Dijkstra algorithm to determine the shortest path from
the local router to other routers in the link-state database.
Related
Documentation

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding


This example shows how to configure a multi-level IS-IS topology.

Requirements on page 20

Overview on page 20

Configuration on page 21

Verification on page 25

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Like OSPF, the IS-IS protocol supports the partitioning of a routing domain into multiple
areas with levels that control interarea flooding. The use of multiple levels improves
protocol scalability, as Level 2 (backbone) link-state PDUs are normally not flooded into
a Level 1 area.
An IS-IS Level 2 area is analogous to the OSPF backbone area (0), while a Level 1 area
operates much like an OSPF totally stubby area, in that a default route is normally used
to reach both inter-level and AS external routes.
Unlike OSPF, IS-IS area boundaries occur between routers, such that a given routing
device is always wholly contained within a particular area. Level 1 adjacencies can be
formed between routers that share a common area number, while a Level 2 adjacency
can be formed between routers that might or might not share an area number.
Figure 3 on page 21 shows the topology used in this example.

20

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

Figure 3: IS-IS Multi-Level Topology


S1

fe-1/2/0.42 .42
10.0.0.40/30

49.002
Level 1

fe-1/2/2.41 .41
R3

.21

R6
.30
.22
.26

.33
R5

.18

.29
.38

.25

.34
.37

R4

R7

49.001

g041256

.17
Level 2

CLI Quick Configuration on page 21 shows the configuration for all of the devices in
Figure 3 on page 21. The section Step-by-Step Procedure on page 23 describes the
steps on Device R5.
This example has the following characteristics:

Device R5 functions as a Level 1/Level 2 router to interconnect the Level 2 backbone


area 49.001 and the Level 1 area 49.002 containing Device R6 and Device R7.

The system ID is based on the devices IPv4 lo0 addresses.

Loss of any individual interface does not totally disrupt the IS-IS operation.

The IPv4 lo0 addresses of all routers are reachable through IS-IS.

The link between Device R3 and Device S1 appears in area 49.001 as an intra-area
route. No IS-IS adjacencies can be established on this interface. This is accomplished
by configuring the passive statement on Device R3s interface to Device S1.

The loopback addresses of Level 2 devices do not appear in a Level 1 area.

There is only one adjacency for each device pairing.

Configuration
CLI Quick
Configuration

Device R3

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces fe-1/2/0 unit 0 description to-R4
set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R5
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.41/30

Copyright 2015, Juniper Networks, Inc.

21

IS-IS Feature Guide for Routing Devices

set interfaces fe-1/2/2 unit 0 description to-S1


set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.001.0192.0168.0003.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0 level 1 disable
set protocols isis interface fe-1/2/2.0 passive

22

Device R4

set interfaces fe-1/2/0 unit 0 description to-R3


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R5
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.25/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.001.0192.0168.0004.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0 level 1 disable

Device R5

set interfaces fe-1/2/0 unit 0 description to-R3


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.22/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R4
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.26/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R6
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.29/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/3 unit 0 description to-R7
set interfaces fe-1/2/3 unit 0 family inet address 10.0.0.38/30
set interfaces fe-1/2/3 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.5/32
set interfaces lo0 unit 0 family iso address 49.002.0192.0168.0005.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 2 disable
set protocols isis interface fe-1/2/3.0 level 2 disable
set protocols isis interface lo0.0 level 1 disable

Device R6

set interfaces fe-1/2/0 unit 0 description to-R5


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.30/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R7
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.33/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.6/32
set interfaces lo0 unit 0 family iso address 49.002.0192.0168.0006.00
set protocols isis interface fe-1/2/0.0 level 2 disable
set protocols isis interface fe-1/2/1.0 level 2 disable
set protocols isis interface lo0.0 level 2 disable

Device R7

set interfaces fe-1/2/0 unit 0 description to-R6


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.34/30
set interfaces fe-1/2/0 unit 0 family iso

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

set interfaces fe-1/2/1 unit 0 description to-R5


set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.37/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.7/32
set interfaces lo0 unit 0 family iso address 49.002.0192.0168.0007.00
set protocols isis interface fe-1/2/0.0 level 2 disable
set protocols isis interface fe-1/2/1.0 level 2 disable
set protocols isis interface lo0.0 level 2 disable

Device S1

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.42/30


set interfaces fe-1/2/0 unit 0 description to-R3

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure multi-level IS-IS:
1.

Configure the network interfaces.


Enable IS-IS on the interfaces by Including the ISO address family on each interface.
[edit interfaces]
user@R5# set fe-1/2/0 unit 0 description to-R3
user@R5# set fe-1/2/0 unit 0 family inet address 10.0.0.22/30
user@R5# set fe-1/2/0 unit 0 family iso
user@R5# set fe-1/2/1 unit 0 description to-R4
user@R5# set fe-1/2/1 unit 0 family inet address 10.0.0.26/30
user@R5# set fe-1/2/1 unit 0 family iso
user@R5# set fe-1/2/2 unit 0 description to-R6
user@R5# set fe-1/2/2 unit 0 family inet address 10.0.0.29/30
user@R5# set fe-1/2/2 unit 0 family iso
user@R5# set fe-1/2/3 unit 0 description to-R7
user@R5# set fe-1/2/3 unit 0 family inet address 10.0.0.38/30
user@R5# set fe-1/2/3 unit 0 family iso

2.

Configure two loopback interface addresses.


One address is for IPv4.
The other is for the IS-IS area 49.002 so that Device R5 can form adjacencies with
the other Level 1 devices in area 49.002. Even though Device R5s NET identifies
itself as belonging to the Level 1 area 49.002, its loopback interface is not configured
as a Level 1 interface. Doing so would cause the route to Device R5s loopback to
be injected into the Level 1 area.
[edit interfaces lo0 unit 0]
user@R5# set family inet address 192.168.0.5/32
user@R5# set family iso address 49.002.0192.0168.0005.00

3.

Specify the IS-IS level on a per-interface basis.


Device R5 becomes adjacent to the other routing devices on the same level on each
link.
By default, IS-IS is enabled for IS-IS areas on all interfaces on which the ISO protocol
family is enabled (at the [edit interfaces interface-name unit logical-unit-number]

Copyright 2015, Juniper Networks, Inc.

23

IS-IS Feature Guide for Routing Devices

hierarchy level). To disable IS-IS at any particular level on an interface, include the
disable statement.
Device R5s loopback interface is configured to run Level 2 only. If Level 1 operation
were enabled on lo0.0, Device R5 would include its loopback address in its Level 1
link-state PDU, which is incorrect for this example in which the loopback addresses
of Level 2 devices must not appear in a Level 1 area.
Unlike OSPF, you must explicitly list the routers lo0 interface at the [edit protocols
isis] hierarchy level, because this interface is the source of the routers NET, and
therefore must be configured as an IS-IS interface. In IS-IS, the lo0 interface operates
in the passive mode by default, which is ideal because adjacency formation can
never occur on a virtual interface.
[edit protocols isis]
user@R5# set interface fe-1/2/0.0 level 1 disable
user@R5# set interface fe-1/2/1.0 level 1 disable
user@R5# set interface fe-1/2/0.0 level 2 disable
user@R5# set interface fe-1/2/3.0 level 2 disable
user@R5# set interface lo0.0 level 1 disable

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R5# show interfaces
fe-1/2/0 {
unit 0{
description to-R3;
family inet {
address 10.0.0.22/30;
}
family iso;
}
}
fe-1/2/1 {
unit 0 {
description to-R4;
family inet {
address 10.0.0.26/30;
}
family iso;
}
}
fe-1/2/2 {
unit 0 {
description to-R6;
family inet {
address 10.0.0.29/30;
}
family iso;
}
}
fe-1/2/3 {
unit 0 {

24

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

description to-R7;
family inet {
address 10.0.0.38/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.5/32;
}
family iso {
address 49.002.0192.0168.0005.00;
}
}
}
user@R5# show protocols
isis {
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface fe-1/2/0.0 {
level 2 disable;
}
interface fe-1/2/3.0 {
level 2 disable;
}
interface lo0.0 {
level 1 disable;
}
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Checking Interface-to-Area Associations on page 25

Verifying IS-IS Adjacencies on page 26

Examining the IS-IS Database on page 27

Checking Interface-to-Area Associations


Purpose
Action

Make sure that the interface-to-area associations are configured as expected.


From operational mode, enter the show isis interface command.
user@R5> show isis interface

Copyright 2015, Juniper Networks, Inc.

25

IS-IS Feature Guide for Routing Devices

IS-IS interface database:


Interface
L CirID Level 1 DR
lo0.0
3
0x1 Disabled
fe-1/2/0.0
2
0x3 Disabled
fe-1/2/1.0
2
0x2 Disabled
fe-1/2/0.0
1
0x1 R6.02
fe-1/2/3.0
1
0x4 R5.04

Meaning

Level 2 DR
Passive
R5.03
R5.02
Disabled
Disabled

L1/L2 Metric
0/0
10/10
10/10
10/10
10/10

The output shows that Device R5s interfaces have been correctly configured with the
ISO family, and that the interfaces have been placed into the correct levels.
You can also see that Device R5 has elected itself as the designated intermediate system
(DIS) on its broadcast-capable IS-IS interfaces.

Verifying IS-IS Adjacencies


Purpose

Action

Verify that the expected adjacencies have formed between Device R5 and its IS-IS
neighbors.
From operational mode, enter the show isis adjacency detail command.
user@R5> show isis adjacency detail
R3
Interface: fe-1/2/0.0, Level: 2, State: Up, Expires in 25 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:31 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.03, IP addresses: 10.0.0.21
R4
Interface: fe-1/2/1.0, Level: 2, State: Up, Expires in 24 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:36 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.02, IP addresses: 10.0.0.25
R6
Interface: fe-1/2/0.0, Level: 1, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:20:24 ago
Circuit type: 1, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R6.02, IP addresses: 10.0.0.30
R7
Interface: fe-1/2/3.0, Level: 1, State: Up, Expires in 21 secs
Priority: 64, Up/Down transitions: 1, Last transition: 03:19:29 ago
Circuit type: 1, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R5.04, IP addresses: 10.0.0.37

Meaning

26

These results confirm that Device R5 has two Level 2 adjacencies and two Level 1
adjacencies.

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

Examining the IS-IS Database


Purpose

Action

Because Device R5 is a Level 1/Level 2 (L1/L2) attached router, examine the Level 1
link-state database associated with area 49.002 to confirm that loopback addresses
from backbone routers are not being advertised into the Level 1 area.
From operational mode, enter the show isis database detail command.
user@R5> show isis database detail
IS-IS level 1 link-state database:
R5.00-00 Sequence: 0x19, Checksum: 0x7488, Lifetime: 727 secs
IS neighbor: R5.04
Metric:
10
IS neighbor: R6.02
Metric:
10
IP prefix: 10.0.0.28/30
Metric:
10 Internal Up
IP prefix: 10.0.0.36/30
Metric:
10 Internal Up
R5.04-00 Sequence: 0x14, Checksum: 0x2668, Lifetime: 821 secs
IS neighbor: R5.00
Metric:
0
IS neighbor: R7.00
Metric:
0
R6.00-00 Sequence: 0x17, Checksum: 0xa65, Lifetime: 774 secs
IS neighbor: R6.02
Metric:
10
IS neighbor: R7.02
Metric:
10
IP prefix: 10.0.0.28/30
Metric:
10 Internal Up
IP prefix: 10.0.0.32/30
Metric:
10 Internal Up
IP prefix: 192.168.0.6/32
Metric:
0 Internal Up
R6.02-00 Sequence: 0x13, Checksum: 0xd1c0, Lifetime: 908 secs
IS neighbor: R5.00
Metric:
0
IS neighbor: R6.00
Metric:
0
R7.00-00 Sequence: 0x17, Checksum: 0xe39, Lifetime: 775 secs
IS neighbor: R5.04
Metric:
10
IS neighbor: R7.02
Metric:
10
IP prefix: 10.0.0.32/30
Metric:
10 Internal Up
IP prefix: 10.0.0.36/30
Metric:
10 Internal Up
IP prefix: 192.168.0.7/32
Metric:
0 Internal Up
R7.02-00 Sequence: 0x13, Checksum: 0x404d, Lifetime: 966 secs
IS neighbor: R6.00
Metric:
0
IS neighbor: R7.00
Metric:
0
IS-IS level 2 link-state database:
R3.00-00 Sequence: 0x17, Checksum: 0x5f84, Lifetime: 1085 secs
IS neighbor: R4.02
Metric:
10
IS neighbor: R5.03
Metric:
10
IP prefix: 10.0.0.16/30
Metric:
10
IP prefix: 10.0.0.20/30
Metric:
10
IP prefix: 10.0.0.40/30
Metric:
10
IP prefix: 192.168.0.3/32
Metric:
0

Internal
Internal
Internal
Internal

Up
Up
Up
Up

R4.00-00 Sequence: 0x17, Checksum: 0xab3a, Lifetime: 949 secs


IS neighbor: R4.02
Metric:
10
IS neighbor: R5.02
Metric:
10
IP prefix: 10.0.0.16/30
Metric:
10 Internal Up
IP prefix: 10.0.0.24/30
Metric:
10 Internal Up
IP prefix: 192.168.0.4/32
Metric:
0 Internal Up

Copyright 2015, Juniper Networks, Inc.

27

IS-IS Feature Guide for Routing Devices

R4.02-00 Sequence: 0x14, Checksum: 0xf2a8, Lifetime: 1022 secs


IS neighbor: R3.00
Metric:
0
IS neighbor: R4.00
Metric:
0
R5.00-00 Sequence: 0x1f, Checksum: 0x20d7, Lifetime: 821 secs
IS neighbor: R5.02
Metric:
10
IS neighbor: R5.03
Metric:
10
IP prefix: 10.0.0.20/30
Metric:
10
IP prefix: 10.0.0.24/30
Metric:
10
IP prefix: 10.0.0.28/30
Metric:
10
IP prefix: 10.0.0.32/30
Metric:
20
IP prefix: 10.0.0.36/30
Metric:
10
IP prefix: 192.168.0.5/32
Metric:
0
IP prefix: 192.168.0.6/32
Metric:
10
IP prefix: 192.168.0.7/32
Metric:
10

Internal
Internal
Internal
Internal
Internal
Internal
Internal
Internal

Up
Up
Up
Up
Up
Up
Up
Up

R5.02-00 Sequence: 0x14, Checksum: 0x6135, Lifetime: 977 secs


IS neighbor: R4.00
Metric:
0
IS neighbor: R5.00
Metric:
0
R5.03-00 Sequence: 0x14, Checksum: 0x1483, Lifetime: 1091 secs
IS neighbor: R3.00
Metric:
0
IS neighbor: R5.00
Metric:
0

Meaning

This display indicates that Device R5s loopback interface is correctly configured to run
Level 2 only. Had Level 1 operation been enabled on lo0.0, Device R5 would have then
included its loopback address in its Level 1 link-state PDU.
You can also see that Device R5 has Level 2 link-state PDUs, received from its adjacent
neighbors.
Like an OSPF totally stubby area, no backbone (Level 2) or external prefixes are leaked
into a Level 1 area, by default. Level 1 prefixes are leaked up into the IS-IS backbone,
however, as can be seen in Device R5s Level 2 link-state PDU.

Related
Documentation

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Understanding IS-IS Designated Routers


A router advertises its priority to become a designated router in its hello packets. On all
multiaccess networks (physical networks that support the attachment of more than two
routers, such as Ethernet networks), IS-IS uses the advertised priorities to elect a
designated router for the network. This router is responsible for sending network link-state
advertisements, which describe all the routers attached to the network. These
advertisements are flooded throughout a single area. The priority value is meaningful
only on a multiaccess network. It has no meaning on a point-to-point interface.
A routers priority for becoming the designated router is indicated by an arbitrary number
from 0 through 127, which you configure on the IS-IS interface. The router with the highest
priority becomes the designated router for the area (Level 1, Level 2, or both), also
configured on the IS-IS interface. If routers in the network have the same priority, then

28

Copyright 2015, Juniper Networks, Inc.

Chapter 2: Configuring a Basic IS-IS Network

the router with the highest MAC address is elected as the designated router. By default,
routers have a priority value of 64.
Related
Documentation

IS-IS Overview on page 3

Configuring Designated Router Election Priority for IS-IS on page 29

Configuring Designated Router Election Priority for IS-IS


This example shows how to configure the designated router election priority for IS-IS.
Before you begin:

Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.

Enable IS-IS on the interfaces. See Example: Configuring IS-IS on page 14.

In this example, you configure the priority for logical interface ge-0/0/1.0 to be 100 and
the level number to be 1. If this interface has the highest priority value, the router becomes
the designated router for the Level 1 area.
To configure a designated router election priority for IS-IS:
[edit]
user@host# set protocols isis interface ge-0/0/1.0 level 1 priority 100

Related
Documentation

Understanding IS-IS Designated Routers on page 28

Example: Configuring IS-IS on page 14

Configuring an ISO System Identifier for the Router


For IS-IS to operate on the router, you can optionally configure a system identifier (system
ID). The system identifier is commonly the media access control (MAC) address or the
IP address expressed in binary-coded decimal (BCD).
If you do not statically map the hostname, the mapping is generated dynamically, based
on the system host-name. If you omit the static-host-mapping hostname sysid statement,
the IS-IS system ID is dynamically generated from the host portion of the ISO address
configured on the loopback interface (lo0) and is mapped to the host-name statement
configured at the [edit system] hierarchy level. Run the show isis hostname command to
view the mappings.
To configure an International Organization for Standardization (ISO) system ID, include
the sysid statement at the [edit system static-host-mapping hostname] hierarchy level:
[edit system]
static-host-mapping {
hostname {
sysid system-identifier;
}

Copyright 2015, Juniper Networks, Inc.

29

IS-IS Feature Guide for Routing Devices

}
hostname is the name specified by the host-name statement at the [edit system] hierarchy

level.
system-identifier is the ISO system identifier. It is the 6-byte system ID portion of the IS-IS

network service access point (NSAP). We recommend that you use the hosts IP address
represented in BCD format. For example, the IP address 192.168.1.77 is 1921.6800.1077 in
BCD.
Related
Documentation

30

Example: Configuring the Unique Identity of a Router for Making it Accessible on the
Network

Copyright 2015, Juniper Networks, Inc.

CHAPTER 3

Configuring IS-IS Authentication and


Checksums

Configuring IS-IS Authentication on page 31

Configuring IS-IS Authentication Without Network-Wide Deployment on page 33

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Understanding Checksums on IS-IS Interfaces for Error Checking on page 38

Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 39

Configuring IS-IS Authentication


All IS-IS protocol exchanges can be authenticated to guarantee that only trusted routing
devices participate in the autonomous system (AS) routing. By default, IS-IS
authentication is disabled on the routing device.
To configure IS-IS authentication, you must define an authentication password and
specify the authentication type.
You can configure one of the following authentication methods:

Simple authenticationUses a text password that is included in the transmitted packet.


The receiving routing device uses an authentication key (password) to verify the packet.
Simple authentication is included for compatibility with existing IS-IS implementations.
However, we recommend that you do not use this authentication method because it
is insecure (the text can be sniffed).

CAUTION: A simple password that exceeds 254 characters is truncated.

HMAC-MD5 authenticationUses an iterated cryptographic hash function. The receiving


routing device uses an authentication key (password) to verify the packet.

You can also configure more fine-grained interface-level authentication for hello packets.
To enable authentication and specify an authentication method, include the
authentication-type statement, specifying the simple or md5 authentication type:

Copyright 2015, Juniper Networks, Inc.

31

IS-IS Feature Guide for Routing Devices

authentication-type authentication;

For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
To configure a password, include the authentication-key statement. The authentication
password for all routing devices in a domain must be the same.
authentication-key key;

For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
To configure hitless authentication key rollover, include the authentication-key-chain
(Protocols IS-IS) statement.
The password can contain up to 255 characters. If you include spaces, enclose all
characters in quotation marks ( ).
If you are using the Junos OS IS-IS software with another implementation of IS-IS, the
other implementation must be configured to use the same password for the domain, the
area, and all interfaces that are shared with a Junos OS implementation.
Authentication of hello packets, partial sequence number PDU (PSNP), and complete
sequence number PDU (CSNP) can be suppressed to enable interoperability with the
routing software of different vendors. Different vendors handle authentication in various
ways, and suppressing authentication for different PDU types might be the simplest way
to allow compatibility within the same network.
To configure IS-IS to generate authenticated packets, but not to check the authentication
on received packets, include the no-authentication-check statement:
no-authentication-check;

To suppress authentication of IS-IS hello packets, include the no-hello-authentication


statement:
no-hello-authentication;

To suppress authentication of PSNPs, include the no-psnp-authentication statement:


no-psnp-authentication;

To suppress authentication of CSNPs, include the no-csnp-authentication statement:


no-csnp-authentication;

For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.

NOTE: The authentication and the no-authentication statements must be


configured at the same hierarchy level. Configuring authentication at the [edit
protocols isis interface interface-name] hierarchy level and configuring
no-authentication at the [edit protocols isis] hierarchy level has no effect.

32

Copyright 2015, Juniper Networks, Inc.

Chapter 3: Configuring IS-IS Authentication and Checksums

Related
Documentation

Configuring IS-IS Authentication Without Network-Wide Deployment on page 33

Configuring IS-IS Authentication Without Network-Wide Deployment


To allow the use of authentication without requiring network-wide deployment, include
the loose-authentication-check statement:
loose-authentication-check;

For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
Related
Documentation

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Understanding Hitless Authentication Key Rollover for IS-IS


IS-IS protocol exchanges can be authenticated to guarantee that only trusted routing
devices participate in routing. By default, authentication is disabled. The authentication
algorithm creates an encoded checksum that is included in the transmitted packet. The
receiving routing device uses an authentication key (password) to verify the packets
checksum.
If you configure authentication for all peers, each peer in that group inherits the groups
authentication.
You can update authentication keys without resetting any IS-IS neighbor sessions. This
is referred to as hitless authentication key rollover.
Hitless authentication key rollover uses authentication keychains, which consist of the
authentication keys that are being updated. The keychain includes multiple keys. Each
key in the keychain has a unique start time. At the next keys start time, a rollover occurs
from the current key to the next key, and the next key becomes the current key.
You can choose the algorithm through which authentication is established. You can
configure MD5 or SHA-1 authentication. You associate a keychain and the authentication
algorithm with an IS-IS neighboring session. Each key contains an identifier and a secret
password.
The sending peer chooses the active key based on the system time and the start times
of the keys in the keychain. The receiving peer determines the key with which it
authenticates based on the incoming key identifier.
You can configure either RFC 5304-based encoding or RFC 5310-based encoding for the
IS-IS protocol transmission encoding format.
Related
Documentation

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Copyright 2015, Juniper Networks, Inc.

33

IS-IS Feature Guide for Routing Devices

Example: Configuring Hitless Authentication Key Rollover for IS-IS


This example shows how to configure hitless authentication key rollover for IS-IS.

Requirements on page 34

Overview on page 34

Configuration on page 35

Verification on page 38

Requirements
No special configuration beyond device initialization is required before configuring hitless
authentication key rollover for IS-IS.

Overview
Authentication guarantees that only trusted routers participate in routing updates. This
keychain authentication method is referred to as hitless because the keys roll over from
one to the next without resetting any peering sessions or interrupting the routing protocol.
Junos OS supports both RFC 5304, IS-IS Cryptographic Authentication and RFC 5310,
IS-IS Generic Cryptographic Authentication.
This example includes the following statements for configuring the keychain:

algorithmFor each key in the keychain, you can specify an encryption algorithm. The

algorithm can be SHA-1 or MD-5.

keyA keychain can have multiple keys. Each key within a keychain must be identified

by a unique integer value. The range of valid identifier values is from 0 through 63.

key-chainFor each keychain, you must specify a name. This example defines two

keychains: base-key-global and base-key-inter.

optionsFor each key in the keychain, you can specify the encoding for the message

authentication code:isis-enhanced or basic. The basic (RFC 5304) operation is enabled


by default.
When you configure the isis-enhanced option, Junos OS sends RFC 5310-encoded
routing protocol packets and accepts both RFC 5304-encoded and RFC 5310-encoded
routing protocol packets that are received from other devices.
When you configure basic (or do not include the options statement in the key
configuration), Junos OS sends and receives RFC 5304-encoded routing protocols
packets, and drops 5310-encoded routing protocol packets that are received from
other devices.
Because this setting is for IS-IS only, the TCP and the BFD protocols ignore the encoding
option configured in the key.

34

Copyright 2015, Juniper Networks, Inc.

Chapter 3: Configuring IS-IS Authentication and Checksums

secretFor each key in the keychain, you must set a secret password. This password

can be entered in either encrypted or plain text format in the secret statement. It is
always displayed in encrypted format.

start-timeEach key must specify a start time in UTC format. Control gets passed

from one key to the next. When a configured start time arrives (based on the routing
devices clock), the key with that start time becomes active. Start times are specified
in the local time zone for a routing device and must be unique within the key chain.
You can apply a keychain globally to all interfaces or more granularly to specific interfaces.
This example includes the following statements for applying the keychain to all interfaces
or to particular interfaces:

authentication-key-chainEnables you to apply a keychain at the global IS-IS level for

all Level 1 or all Level 2 interfaces.

hello-authentication-key-chainEnables you to apply a keychain at the individual IS-IS

interface level. The interface configuration overrides the global configuration.


Figure 4 on page 35 shows the topology used in the example.

Figure 4: Hitless Authentication Key Rollover for IS-IS


{

ISIS Level 1

ISIS Level 2
B

FE/GE/XE

R1
A

FE/GE/XE

R0
A

R2
A

B
SONET

FE/GE/XE

R3
A

g040568

This example shows the configuration for Router R0.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces ge-0/0/0 unit 0 description "interface A"
set interfaces ge-0/0/0 unit 0 family inet address 10.0.0.1/30
set interfaces ge-0/0/0 unit 0 family iso
set interfaces ge-0/0/0 unit 0 family inet6 address fe80::200:f8ff:fe21:67cf/128
set interfaces ge-0/0/1 unit 0 description "interface B"
set interfaces ge-0/0/1 unit 0 family inet address 10.0.0.5/30
set interfaces ge-0/0/1 unit 0 family iso
set interfaces ge-0/0/1 unit 0 family inet6 address 10FB::C:ABC:1F0C:44DA/128
set interfaces ge-0/0/2 unit 0 description "interface C"
set interfaces ge-0/0/2 unit 0 family inet address 10.0.0.9/30
set interfaces ge-0/0/2 unit 0 family iso

Copyright 2015, Juniper Networks, Inc.

35

IS-IS Feature Guide for Routing Devices

set interfaces ge-0/0/2 unit 0 family inet6 address ff06::c3/128


set security authentication-key-chains key-chain base-key-global key 63 secret
"$9$jfkqfTQnCpBDiCt"
set security authentication-key-chains key-chain base-key-global key 63 start-time
"2011-8-6.06:54:00-0700"
set security authentication-key-chains key-chain base-key-global key 63 algorithm
hmac-sha-1
set security authentication-key-chains key-chain base-key-global key 63 options
isis-enhanced
set security authentication-key-chains key-chain base-key-inter key 0 secret
"$9$8sgx7Vws4ZDkWLGD"
set security authentication-key-chains key-chain base-key-inter key 0 start-time
"2011-8-6.06:54:00-0700"
set security authentication-key-chains key-chain base-key-inter key 0 algorithm md5
set security authentication-key-chains key-chain base-key-inter key 0 options basic
set protocols isis level 1 authentication-key-chain base-key-global
set protocols isis interface ge-0/0/0.0 level 1 hello-authentication-key-chain
base-key-inter

Step-by-Step
Procedure

To configure hitless authentication key rollover for IS-IS:


1.

Configure the Router R0 interfaces.


[edit interfaces ge-0/0/0 unit 0]
user@R0# set description "interface A"
user@R0# set family inet address 10.0.0.1/30
user@R0# set family iso
user@R0# set family inet6 address fe80::200:f8ff:fe21:67cf/128
[edit interfaces ge-0/0/1 unit 0]
user@R0# set interfaces ge-0/0/1 unit 0 description "interface B"
user@R0# set interfaces ge-0/0/1 unit 0 family inet address 10.0.0.5/30
user@R0# set interfaces ge-0/0/1 unit 0 family iso
user@R0# set interfaces ge-0/0/1 unit 0 family inet6 address
10FB::C:ABC:1F0C:44DA/128
[edit interfaces ge-0/0/2 unit 0]
user@R0# set description "interface C"
user@R0# set family inet address 10.0.0.9/30
user@R0# set interfaces ge-0/0/2 unit 0 family iso
user@R0# set interfaces ge-0/0/2 unit 0 family inet6 address ff06::c3/128

2.

Configure one or more authentication keys.


[edit security authentication-key-chains key-chain base-key-global]
user@R0# set key 63 secret "$9$jfkqfTQnCpBDiCt"
user@R0# set key 63 start-time "2011-8-6.06:54:00-0700"
user@R0# set key 63 algorithm hmac-sha-1
user@R0# set key 63 options isis-enhanced
[edit security authentication-key-chains key-chain base-key-inter]
user@R0# set key 0 secret "$9$8sgx7Vws4ZDkWLGD"
user@R0# set key 0 start-time "2011-8-6.06:54:00-0700"
user@R0# set key 0 algorithm md5
user@R0# set key 0 options basic

3.

Apply the base-key-global keychain to all Level 1 IS-IS interfaces on Router R0.
[edit protocols isis level 1]
user@R0# set authentication-key-chain base-key-global

36

Copyright 2015, Juniper Networks, Inc.

Chapter 3: Configuring IS-IS Authentication and Checksums

4.

Apply the base-key-inter keychain to the ge-0/0/0.0 interface on Router R0.


[edit protocols isis interface ge-0/0/0.0 level 1]
user@R0# set hello-authentication-key-chain base-key-inter

5.

If you are done configuring the device, commit the configuration.


user@R0# commit

Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show security commands. If the output does not display the intended
configuration, repeat the instructions in this example to correct the configuration.
user@R0# show interfaces
ge-0/0/0 {
unit 0 {
description "interface A";
family inet {
address 10.0.0.1/30;
}
family iso;
family inet6 {
address fe80::200:f8ff:fe21:67cf/128;
}
}
}
ge-0/0/1 {
unit 0 {
description "interface B";
family inet {
address 10.0.0.5/30;
}
family iso;
family inet6 {
address 10FB::C:ABC:1F0C:44DA/128;
}
}
}
ge-0/0/2 {
unit 0 {
description "interface C";
family inet {
address 10.0.0.9/30;
}
family iso;
family inet6 {
address ff06::c3/128;
}
}
}
user@R0# show protocols
isis {
level 1 authentication-key-chain base-key-global;

Copyright 2015, Juniper Networks, Inc.

37

IS-IS Feature Guide for Routing Devices

interface ge-0/0/0.0 {
level 1 hello-authentication-key-chain base-key-inter;
}
}
user@R0# show security
authentication-key-chains {
key-chain base-key-global {
key 63 {
secret "$9$jfkqfTQnCpBDiCt"; ## SECRET-DATA
start-time "2011-8-6.06:54:00-0700";
algorithm hmac-sha-1;
options isis-enhanced;
}
}
key-chain base-key-inter {
key 0 {
secret "$9$8sgx7Vws4ZDkWLGD"; ## SECRET-DATA
start-time "2011-8-6.06:54:00-0700";
algorithm md5;
options basic;
}
}
}

Verification
To verify the configuration, run the following commands:

Related
Documentation

show isis authentication

show security keychain

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Understanding Checksums on IS-IS Interfaces for Error Checking


The checksum enables IS-IS to check at the receiver if the IS-IS protocol frames have
become corrupted while traversing the network.
Sometimes corrupt IS-IS protocol frames can go undetected. If routing control traffic
becomes corrupted, it is likely that user payload traffic might be corrupted, too. This can
lead to unacceptable throughput. To prevent corrupt frames from going undetected, we
recommend enabling checksumming on the IS-IS interfaces.
To review, IS-IS hello (IIH) PDUs establish adjacencies with other routing devices. A
partial sequence number PDU (PSNP) is used by an IS-IS router to request link-state
PDU information from a neighboring router. The complete sequence number PDU (CSNP)
lists all the link-state PDUs in the link-state database.
The original specification for IS-IS does not provide checksums for IIHs, CSNPs, and
PSNPs.

38

Copyright 2015, Juniper Networks, Inc.

Chapter 3: Configuring IS-IS Authentication and Checksums

RFC 3358, Optional Checksums in Intermediate System to Intermediate System (ISIS)


introduced an optional type, length, and value (TLV) tuple that provides checksums for
IIHs, PSNPs, and CSNPs.
Junos OS supports the checksumming TLV on a per-interface basis.
Related
Documentation

Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 39

Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking


This example shows how to enable packet checksums for IS-IS interfaces.

Requirements on page 39

Overview on page 39

Configuration on page 40

Verification on page 40

Requirements
Before you begin, configure IS-IS on both routers. See Example: Configuring IS-IS on
page 14 for information about the sample IS-IS configuration.

Overview
Junos OS supports IS-IS checksums as documented in RFC 3358, Optional Checksums
in Intermediate System to Intermediate System (ISIS).
IS-IS protocol data units (PDUs) include link-state PDUs, complete sequence number
PDUs (CSNPs), partial sequence number PDUs (PSNPs), and IS-IS hello (IIH) packets.
These PDUs can be corrupt due to faulty implementations of Layer 2 hardware or lack
of checksums on a specific network technology. Corruption of length or type, length, and
value (TLV) fields can lead to the generation of extensive numbers of empty link-state
PDUs in the receiving node. Because authentication is not a replacement for a checksum
mechanism, you might want to enable the optional checksum TLV on your IS-IS interfaces.
The checksum cannot be enabled with MD5 hello authentication on the same interface.
Figure 5 on page 39 shows the topology used in this example.

Figure 5: IS-IS Checksum Topology


10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

This example describes the steps on Device R1.

Copyright 2015, Juniper Networks, Inc.

39

IS-IS Feature Guide for Routing Devices

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

Step-by-Step
Procedure

set protocols isis traceoptions file isis


set protocols isis traceoptions flag all
set protocols isis interface fe-1/2/0.1 checksum

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS checksums:
1.

Enable checksums.
[edit protocols isis interface fe-1/2/0.1]
user@R1# set checksum

2.

(Optional) Enable tracing for tracking checksum operations.


[edit protocols isis traceoptions]
user@R1# set file isis
user@R1# set flag all

Results

From configuration mode, confirm your configuration by entering the show protocols
commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@R1# show protocols
isis {
traceoptions {
file isis;
flag all;
}
interface fe-1/2/0.1 {
checksum;
}
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying Checksums
Purpose

40

Verify that checksums are performed.

Copyright 2015, Juniper Networks, Inc.

Chapter 3: Configuring IS-IS Authentication and Checksums

Action

From operational mode, enter the show log isis | match checksum command.
user@R1> show log isis | match checksum
May
May
May
May
May
May
May
May
May
May
May
May
May
May
May
May
May

Meaning

Related
Documentation

31
31
31
31
31
31
31
31
31
31
31
31
31
31
31
31
31

16:47:39.513267
16:47:39.513394
16:47:39.513517
16:47:46.563781
16:47:46.563970
16:47:46.564104
16:47:46.581087
16:47:46.581222
16:47:46.581353
16:47:55.799090
16:47:55.799223
16:47:55.799347
16:47:55.818255
16:47:55.818473
16:47:55.818606
16:48:03.455816
16:48:03.455973

sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence
sequence

0x49
0x4e
0x50
0x45
0x46
0x52
0x49
0x4e
0x50
0x45
0x46
0x52
0x49
0x4e
0x50
0x49
0x4e

checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum
checksum

0x8e64
0x34b3
0x9dcb
0x7e1a
0x226d
0x99cd
0x8e64
0x34b3
0x9dcb
0x7e1a
0x226d
0x99cd
0x8e64
0x34b3
0x9dcb
0x8e64
0x34b3

The output shows that checksum information is captured in the IS-IS trace log file.

Understanding Checksums on IS-IS Interfaces for Error Checking on page 38

Copyright 2015, Juniper Networks, Inc.

41

IS-IS Feature Guide for Routing Devices

42

Copyright 2015, Juniper Networks, Inc.

CHAPTER 4

Configuring IS-IS Routing Policy and Route


Redistribution

Understanding Routing Policies on page 43

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Example: Configuring Backup Selection Policy for IS-IS Protocol on page 48

Configuring Backup Selection Policy for the IS-IS Protocol on page 77

Example: Redistributing OSPF Routes into IS-IS on page 83

Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1


Area on page 91

Understanding BGP Communities and Extended Communities as Routing Policy Match


Conditions on page 97

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS on page 98

IS-IS Extensions to Support Route Tagging on page 107

Understanding Routing Policies


For some routing platform vendors, the flow of routes occurs between various protocols.
If, for example, you want to configure redistribution from RIP to OSPF, the RIP process
tells the OSPF process that it has routes that might be included for redistribution. In Junos
OS, there is not much direct interaction between the routing protocols. Instead, there are
central gathering points where all protocols install their routing information. These are
the main unicast routing tables inet.0 and inet6.0.
From these tables, the routing protocols calculate the best route to each destination and
place these routes in a forwarding table. These routes are then used to forward routing
protocol traffic toward a destination, and they can be advertised to neighbors.

Importing and Exporting Routes on page 44

Active and Inactive Routes on page 45

Explicitly Configured Routes on page 45

Dynamic Database on page 46

Copyright 2015, Juniper Networks, Inc.

43

IS-IS Feature Guide for Routing Devices

Importing and Exporting Routes


Two termsimport and exportexplain how routes move between the routing protocols
and the routing table.

When the Routing Engine places the routes of a routing protocol into the routing table,
it is importing routes into the routing table.

When the Routing Engine uses active routes from the routing table to send a protocol
advertisement, it is exporting routes from the routing table.

NOTE: The process of moving routes between a routing protocol and the
routing table is described always from the point of view of the routing table.
That is, routes are imported into a routing table from a routing protocol and
they are exported from a routing table to a routing protocol. Remember
this distinction when working with routing policies.

As shown in Figure 6 on page 44, you use import routing policies to control which routes
are placed in the routing table, and export routing policies to control which routes are
advertised from the routing table to neighbors.

Figure 6: Importing and Exporting Routes


Neighbors

Neighbors
Import Policy 1

Export Policy 1
Routing
Table

Import Policy 2

Export Policy 2
Neighbors

Forwarding
Table

g001706

Neighbors

In general, the routing protocols place all their routes in the routing table and advertise
a limited set of routes from the routing table. The general rules for handling the routing
information between the routing protocols and the routing table are known as the routing
policy framework.
The routing policy framework is composed of default rules for each routing protocol that
determine which routes the protocol places in the routing table and advertises from the
routing table. The default rules for each routing protocol are known as default routing
policies.
You can create routing policies to preempt the default policies, which are always present.
A routing policy allows you to modify the routing policy framework to suit your needs.
You can create and implement your own routing policies to do the following:

44

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Control which routes a routing protocol places in the routing table.

Control which active routes a routing protocol advertises from the routing table. An
active route is a route that is chosen from all routes in the routing table to reach a
destination.

Manipulate the route characteristics as a routing protocol places the route in the routing
table or advertises the route from the routing table.

You can manipulate the route characteristics to control which route is selected as the
active route to reach a destination. The active route is placed in the forwarding table and
is used to forward traffic toward the routes destination. In general, the active route is
also advertised to a routers neighbors.

Active and Inactive Routes


When multiple routes for a destination exist in the routing table, the protocol selects an
active route and that route is placed in the appropriate routing table. For equal-cost
routes, the Junos OS places multiple next hops in the appropriate routing table.
When a protocol is exporting routes from the routing table, it exports active routes only.
This applies to actions specified by both default and user-defined export policies.
When evaluating routes for export, the Routing Engine uses only active routes from the
routing table. For example, if a routing table contains multiple routes to the same
destination and one route has a preferable metric, only that route is evaluated. In other
words, an export policy does not evaluate all routes; it evaluates only those routes that
a routing protocol is allowed to advertise to a neighbor.

NOTE: By default, BGP advertises active routes. However, you can configure
BGP to advertise inactive routes, which go to the same destination as other
routes but have less preferable metrics.

Explicitly Configured Routes


An explicitly configured route is a route that you have configured. Direct routes are not
explicitly configured. They are created as a result of IP addresses being configured on an
interface. Explicitly configured routes include aggregate, generated, local, and static
routes. (An aggregate route is a route that distills groups of routes with common addresses
into one route. A generated route is a route used when the routing table has no information
about how to reach a particular destination. A local route is an IP address assigned to a
router interface. A static route is an unchanging route to a destination.)
The policy framework software treats direct and explicitly configured routes as if they
are learned through routing protocols; therefore, they can be imported into the routing
table. Routes cannot be exported from the routing table to the pseudoprotocol, because
this protocol is not a real routing protocol. However, aggregate, direct, generated, and
static routes can be exported from the routing table to routing protocols, whereas local
routes cannot.

Copyright 2015, Juniper Networks, Inc.

45

IS-IS Feature Guide for Routing Devices

Dynamic Database
In Junos OS Release 9.5 and later, you can configure routing policies and certain routing
policy objects in a dynamic database that is not subject to the same verification required
by the standard configuration database. As a result, you can quickly commit these routing
policies and policy objects, which can be referenced and applied in the standard
configuration as needed. BGP is the only protocol to which you can apply routing policies
that reference policies configured in the dynamic database. After a routing policy based
on the dynamic database is configured and committed in the standard configuration,
you can quickly make changes to existing routing policies by modifying policy objects in
the dynamic database. Because Junos OS does not validate configuration changes to
the dynamic database, when you use this feature, you should test and verify all
configuration changes before committing them.
Related
Documentation

Example: Configuring Dynamic Routing Policies

Example: Redistributing OSPF Routes into IS-IS on page 83

Understanding Backup Selection Policy for IS-IS Protocol


Support for IS-IS loop-free alternate (LFA) routes essentially adds IP fast-reroute
capability for IS-IS. Junos OS precomputes multiple loop-free backup routes for all IS-IS
routes. These backup routes are pre-installed in the Packet Forwarding Engine, which
performs a local repair and implements the backup path when the link for a primary next
hop for a particular route is no longer available. The selection of LFA is done randomly
by selecting any matching LFA to progress to the given destination. This does not ensure
best backup coverage available for the network. In order to choose the best LFA, Junos
OS allows you to configure network-wide backup selection policies for each destination
(IPv4 and IPv6) and a primary next-hop interface. These policies are evaluated based
on admin-group, srlg, bandwidth, protection-type, metric, and neighbor information.
During backup shortest-path-first (SPF) computation, each node and link attribute of
the backup path is accumulated by IGP and is associated with every node (router) in the
topology. The next hop in the best backup path is selected as the backup next hop in the
routing table. In general, backup evaluation policy rules are categorized into the following
types:

Pruning Rules configured to select the eligible backup path.

Ordering Rules configured to select the best among the eligible backup paths.

The backup selection policies can be configured with both pruning and ordering rules.
While evaluating the backup policies, each backup path is assigned a score, an integer
value that signifies the total weight of the evaluated criteria. The backup path with the
highest score is selected.
To enforce LFA selection, configure various rules for the following attributes:

46

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

admin-group Administrative groups, also known as link coloring or resource class,


are manually assigned attributes that describe the color of links, such that links with
the same color conceptually belong to the same class. These configured administrative
groups are defined under protocol MPLS. You can use administrative groups to
implement a variety of backup selection policies using exclude, include-all, include-any,
or preference.

srlg A shared risk link group (SRLG) is a set of links sharing a common resource, which
affects all links in the set if the common resource fails. These links share the same risk
of failure and are therefore considered to belong to the same SRLG. For example, links
sharing a common fiber are said to be in the same SRLG because a fault with the fiber
might cause all links in the group to fail. An SRLG is represented by a 32-bit number
unique within an IGP (IS-IS) domain. A link might belong to multiple SRLGs. You can
define the backup selection to either allow or reject the common SRLGs between the
primary and the backup path.

bandwidthThe bandwidth specifies the bandwidth constraints between the primary


and the backup path. The backup next-hop link can be used only if the bandwidth of
the backup next-hop interface is greater than or equal to the bandwidth of the primary
next hop.

protection-type The protection-type protects the destination from node failure of


the primary node or link failure of the primary link. You can configure node, link, or
node-link to protect the destination.. If link-node is configured , then the node-protecting
LFA is preferred over link-protection LFA.

neighbor- The neighbor is per-neighbor policy information. Here, neighbor can be a


directly connected router, remote router like RSVP backup LSP tail-end, or any other
router in the backup SPF path. The neighbors are identified through the TE-router-ID
TLV advertised by a node in the LSP. You can list the neighbors to either prefer or
exclude them in the backup path.

neighbor-tag The neighbor-tag gives per-neighbor policy information and identifies


a group of nodes in the network. You can list the neighbor tags to exclude or prefer the
neighbors in the backup path selection. The routers are not identified with the explicit
router-id but with an admin-tag prefix to their lo0 address prefix. Neighbor tags are
the route tags advertised as part of extended IP reachability with a /32 prefix length
that represents the TE-router _ID or node ID of a router.

metric Metric decides how the LFAs should be preferred. In backup selection path,
root metric and dest-metric are the two types of metrics. root-metric indicates the
metric to the one-hop neighbor or a remote router such as an RSVP backup LSP tail-end
router. The dest-metric indicates the metric from a one-hop neighbor or remote router
such as an RSVP backup LSP tail-end router to the final destination. The metric
evaluation is done either in ascending or descending order. By default, the first
preference is given to backup paths with lowest destination evaluation and then to
backup paths with lowest root metrics.

The evaluation-order allows you to control the order and criteria of evaluating these
attributes in the backup path. You can explicitly configure the evaluation order. Only the
configured attributes influence the backup path selection. The default order of evaluation

Copyright 2015, Juniper Networks, Inc.

47

IS-IS Feature Guide for Routing Devices

of these attributes for the LFA is [ admin-group srlg bandwidth protection-type neighbor
neighbor-tag metric ] .
Related
Documentation

Example: Configuring Backup Selection Policy for IS-IS Protocol on page 48

backup-selection (Protocols ISIS) on page 322

Example: Configuring Backup Selection Policy for IS-IS Protocol


This example shows how to configure the backup selection policy for the IS-IS protocol.
When you enable backup selection policies, Junos OS allows selection of LFA based on
the policy rules and attributes of the links and nodes in the network. These attributes are
admin-group, srlg, bandwidth, protection-type, metric, neighbor, and neighbor-tag.

Requirements on page 48

Overview on page 48

Configuration on page 49

Verification on page 69

Requirements
This example uses the following hardware and software components:

Eight routers that can be a combination of M Series Multiservice Edge Routers, MX


Series 3D Universal Edge Routers, and T Series Core Routers

Junos OS Release 14.1 or later running on all devices

Before you begin:


1.

Configure the device interfaces.

2. Configure IS-IS.

Overview
Starting with Junos OS Release 14.1, the default loop free alternative (LFA) selection
algorithm or criteria can be overridden with an LFA policy. These policies are configured
for each destination (IPv4 and IPv6) and a primary next-hop interface . These backup
policies enforce LFA selection based on admin-group, srlg, bandwidth, protection-type,
metric, neighbor, and neighbor-tag attributes of the backup path. During backup
shortest-path-first (SPF) computation, each attribute (both node and link) of the backup
path, stored per backup next-hop, is accumulated by IGP. For the routes created internally
by IGP, the attribute set of every backup path is evaluated against the policy configured
for each destination (IPv4 and IPv6) and a primary next-hop interface. The first or the
best backup path is selected and installed as the backup next hop in the routing table.
To configure the backup selection policy, include the backup-selection configuration
statement at the [edit routing-options] hierarchy level. The show backup-selection
command displays the configured policies for a given interface and destination. The
display can be filtered against a particular destination, prefix, interface, or logical systems.

48

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Topology
In this topology, backup selection policy is configured on Device R3.

Figure 7: Backup Selection Path

Configuration
CLI Quick
Configuration

R0

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces ge-4/0/1 unit 0 family inet address 100.0.1.1/24
set interfaces ge-4/0/1 unit 0 family iso
set interfaces ge-4/0/1 unit 0 family inet6 address 2001:100:0:1::1/64
set interfaces ge-4/0/1 unit 0 family mpls
set interfaces ge-0/2/1 unit 0 family inet address 100.0.4.1/24
set interfaces ge-0/2/1 unit 0 family iso
set interfaces ge-0/2/1 unit 0 family inet6 address 2001:100:0:4::1/64
set interfaces ge-0/2/1 unit 0 family mpls
set interfaces ge-1/3/1 unit 0 family inet address 100.0.5.1/24
set interfaces ge-1/3/1 unit 0 family iso
set interfaces ge-1/3/1 unit 0 family inet6 address 2001:100:0:5::1/64
set interfaces ge-1/3/1 unit 0 family mpls
set interfaces ge-1/3/0 unit 0 family inet address 100.0.6.1/24
set interfaces ge-1/3/0 unit 0 family iso
set interfaces ge-1/3/0 unit 0 family inet6 address 2001:100:0:6::1/64
set interfaces ge-1/3/0 unit 0 family mpls

Copyright 2015, Juniper Networks, Inc.

49

IS-IS Feature Guide for Routing Devices

set interfaces ge-0/2/7 unit 0 family inet address 100.0.7.1/24


set interfaces ge-0/2/7 unit 0 family iso
set interfaces ge-0/2/7 unit 0 family inet6 address 2001:100:0:7::1/64
set interfaces ge-0/2/7 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.146/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1001.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:146/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols isis interface ge-4/0/1 level 2 metric 10
set protocols isis interface ge-0/2/1 level 2 metric 18
set protocols isis interface ge-1/3/1 level 2 metric 51
set protocols isis interface ge-1/3/0 level 2 metric 52
set protocols isis interface ge-0/2/7 level 2 metric 23
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108

50

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set routing-options srlg srlg9 srlg-value 109


set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R1

set interfaces ge-0/1/2 unit 0 family inet address 100.0.1.2/24


set interfaces ge-0/1/2 unit 0 family iso
set interfaces ge-0/1/2 unit 0 family inet6 address 2001:100:0:1::2/64
set interfaces ge-0/1/2 unit 0 family mpls
set interfaces ge-3/0/1 unit 0 family inet address 100.1.2.1/24
set interfaces ge-3/0/1 unit 0 family iso
set interfaces ge-3/0/1 unit 0 family inet6 address 2001:100:1:2::1/64
set interfaces ge-3/0/1 unit 0 family mpls
set interfaces ge-3/1/1 unit 0 family inet address 100.1.4.1/24
set interfaces ge-3/1/1 unit 0 family iso
set interfaces ge-3/1/1 unit 0 family inet6 address 2001:100:1:4::1/64
set interfaces ge-3/1/1 unit 0 family mpls
set interfaces ge-3/0/2 unit 0 family inet address 100.1.7.1/24
set interfaces ge-3/0/2 unit 0 family iso
set interfaces ge-3/0/2 unit 0 family inet6 address 2001:100:1:7::1/64
set interfaces ge-3/0/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.156/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1002.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:156/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29

Copyright 2015, Juniper Networks, Inc.

51

IS-IS Feature Guide for Routing Devices

set protocols mpls admin-groups c30 30


set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-0/1/2 srlg srlg9
set protocols mpls interface ge-0/1/2 admin-group c1
set protocols mpls interface ge-0/1/2 admin-group c2
set protocols mpls interface ge-0/1/2 admin-group c6
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R2

52

set interfaces ge-1/3/3 unit 0 family inet address 100.1.2.2/24


set interfaces ge-1/3/3 unit 0 family iso
set interfaces ge-1/3/3 unit 0 family inet6 address 2001:100:1:2::2/64
set interfaces ge-1/3/3 unit 0 family mpls
set interfaces ge-1/0/2 unit 0 family inet address 100.2.3.1/24
set interfaces ge-1/0/2 unit 0 family iso
set interfaces ge-1/0/2 unit 0 family inet6 address 2001:100:2:3::1/64
set interfaces ge-1/0/2 unit 0 family mpls
set interfaces ge-1/2/5 unit 0 family inet address 100.2.4.1/24
set interfaces ge-1/2/5 unit 0 family iso
set interfaces ge-1/2/5 unit 0 family inet6 address 2001:100:2:4::1/64
set interfaces ge-1/2/5 unit 0 family mpls
set interfaces ge-1/3/9 unit 0 family inet address 100.2.5.1/24
set interfaces ge-1/3/9 unit 0 family iso
set interfaces ge-1/3/9 unit 0 family inet6 address 2001:100:2:5::1/64
set interfaces ge-2/3/1 unit 0 family inet address 100.2.6.1/24
set interfaces ge-2/3/1 unit 0 family iso
set interfaces ge-2/3/1 unit 0 family inet6 address 2001:100:2:6::1/64
set interfaces ge-2/3/1 unit 0 family mpls
set interfaces ge-1/0/8 unit 0 family inet address 100.2.7.1/24
set interfaces ge-1/0/8 unit 0 family iso
set interfaces ge-1/0/8 unit 0 family inet6 address 2001:100:2:7::1/64
set interfaces ge-1/0/8 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.178/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1003.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:178/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set protocols mpls admin-groups c7 7


set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-1/0/2 srlg srlg1
set protocols mpls interface ge-1/3/9 srlg srlg1
set protocols mpls interface ge-1/3/9 srlg srlg2
set protocols mpls interface ge-2/3/1 srlg srlg1
set protocols mpls interface ge-1/0/8 srlg srlg7
set protocols isis interface ge-1/0/2 link-protection
set protocols isis interface ge-1/2/5 level 2 metric 12
set protocols isis interface ge-2/3/1 level 2 metric 12
set protocols isis interface ge-1/0/8 level 2 metric 13
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R3

set interfaces ge-1/3/5 unit 0 family inet address 100.2.3.2/24


set interfaces ge-1/3/5 unit 0 family iso
set interfaces ge-1/3/5 unit 0 family inet6 address 2001:100:2:3::2/64
set interfaces ge-1/3/5 unit 0 family mpls
set interfaces ge-0/3/1 unit 0 family inet address 100.3.4.1/24
set interfaces ge-0/3/1 unit 0 family iso
set interfaces ge-0/3/1 unit 0 family inet6 address 2001:100:3:4::1/64

Copyright 2015, Juniper Networks, Inc.

53

IS-IS Feature Guide for Routing Devices

set interfaces ge-0/3/1 unit 0 family mpls


set interfaces ge-0/3/6 unit 0 family inet address 100.3.5.1/24
set interfaces ge-0/3/6 unit 0 family iso
set interfaces ge-0/3/6 unit 0 family inet6 address 2001:100:3:5::1/64
set interfaces ge-0/3/6 unit 0 family mpls
set interfaces ge-2/0/4 unit 0 family inet address 100.3.6.1/24
set interfaces ge-2/0/4 unit 0 family iso
set interfaces ge-2/0/4 unit 0 family inet6 address 2001:100:3:6::1/64
set interfaces ge-2/0/4 unit 0 family mpls
set interfaces ge-1/1/0 unit 0 family inet address 100.3.7.1/24
set interfaces ge-1/1/0 unit 0 family iso
set interfaces ge-1/1/0 unit 0 family inet6 address 2001:100:3:7::1/64
set interfaces ge-1/1/0 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.128/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1004.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:128/128
set interfaces lo0 unit 0 family mpls
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-0/3/1 srlg srlg1
set protocols mpls interface ge-0/3/1 srlg srlg2
set protocols mpls interface ge-0/3/1 admin-group c1
set protocols mpls interface ge-0/3/1 admin-group c2

54

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set protocols mpls interface ge-0/3/1 admin-group c3


set protocols mpls interface ge-0/3/1 admin-group c5
set protocols mpls interface ge-0/3/6 admin-group c1
set protocols mpls interface ge-0/3/6 admin-group c2
set protocols mpls interface ge-2/0/4 admin-group c1
set protocols mpls interface ge-2/0/4 admin-group c2
set protocols mpls interface ge-2/0/4 admin-group c5
set protocols mpls interface ge-1/1/0 admin-group c2
set protocols mpls interface ge-1/1/0 admin-group c12
set protocols isis interface ge-1/3/5 link-protection
set protocols isis interface ge-0/3/1 level 2 metric 21
set protocols isis interface ge-0/3/6 level 2 metric 13
set protocols isis interface ge-2/0/4 level 2 metric 15
set protocols isis interface ge-1/1/0 level 2 metric 22
set protocols isis interface all level 2 metric 10
set routing-options forwarding-table export ecmp
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112
set routing-options backup-selection destination 0.0.0.0/0 interface all admin-group
include-all c1
set routing-options backup-selection destination 0.0.0.0/0 interface all admin-group
include-any c2
set routing-options backup-selection destination 0.0.0.0/0 interface all admin-group
preference c3
set routing-options backup-selection destination 0.0.0.0/0 interface all srlg loose
set routing-options backup-selection destination 0.0.0.0/0 interface all
downstream-paths-only
set routing-options backup-selection destination 0.0.0.0/0 interface all
bandwidth-greater-equal-primary
set routing-options backup-selection destination 0.0.0.0/0 interface all neighbor
preference 10.255.102.178
set routing-options backup-selection destination 0.0.0.0/0 interface all neighbor-tag
preference 1004
set routing-options backup-selection destination 0.0.0.0/0 interface all metric-order
dest
set routing-options backup-selection destination 0.0.0.0/0 interface all evaluation-order
admin-group
set routing-options backup-selection destination 0.0.0.0/0 interface all evaluation-order
srlg
set routing-options backup-selection destination 0.0.0.0/0 interface all evaluation-order
bandwidth
set routing-options backup-selection destination 100.0.1.0/24 interface all srlg strict
set routing-options backup-selection destination 100.0.1.0/24 interface all
bandwidth-greater-equal-primary
set routing-options backup-selection destination 100.0.7.0/24 interface all srlg strict

Copyright 2015, Juniper Networks, Inc.

55

IS-IS Feature Guide for Routing Devices

R4

56

set interfaces ge-2/1/7 unit 0 family inet address 100.0.4.2/24


set interfaces ge-2/1/7 unit 0 family iso
set interfaces ge-2/1/7 unit 0 family inet6 address 2001:100:0:4::2/64
set interfaces ge-2/1/7 unit 0 family mpls
set interfaces ge-2/1/5 unit 0 family inet address 100.1.4.2/24
set interfaces ge-2/1/5 unit 0 family iso
set interfaces ge-2/1/5 unit 0 family inet6 address 2001:100:1:4::2/64
set interfaces ge-2/1/5 unit 0 family mpls
set interfaces ge-8/0/0 unit 0 family inet address 100.2.4.2/24
set interfaces ge-8/0/0 unit 0 family iso
set interfaces ge-8/0/0 unit 0 family inet6 address 2001:100:2:4::2/64
set interfaces ge-8/0/0 unit 0 family mpls
set interfaces ge-2/2/0 unit 0 family inet address 100.3.4.2/24
set interfaces ge-2/2/0 unit 0 family iso
set interfaces ge-2/2/0 unit 0 family inet6 address 2001:100:3:4::2/64
set interfaces ge-2/2/0 unit 0 family mpls
set interfaces ge-2/2/3 unit 0 family inet address 100.4.5.1/24
set interfaces ge-2/2/3 unit 0 family iso
set interfaces ge-2/2/3 unit 0 family inet6 address 2001:100:4:5::1/64
set interfaces ge-2/2/3 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.172/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1005.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:172/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set protocols mpls admin-groups c31 31


set protocols mpls interface all
set protocols mpls interface ge-2/1/7 srlg srlg1
set protocols mpls interface ge-2/1/7 srlg srlg2
set protocols mpls interface ge-2/1/7 srlg srlg3
set protocols mpls interface ge-2/1/7 admin-group c1
set protocols mpls interface ge-2/1/7 admin-group c2
set protocols mpls interface ge-2/1/7 admin-group c6
set protocols mpls interface ge-2/1/7 admin-group c13
set protocols isis interface ge-2/1/7 level 2 metric 18
set protocols isis interface ge-8/0/0 level 2 metric 12
set protocols isis interface ge-2/2/0 level 2 metric 21
set protocols isis interface ge-2/2/3 level 2 metric 10
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R5

set interfaces ge-3/0/1 unit 0 family inet address 100.0.5.2/24


set interfaces ge-3/0/1 unit 0 family iso
set interfaces ge-3/0/1 unit 0 family inet6 address 2001:100:0:5::2/64
set interfaces ge-3/0/1 unit 0 family mpls
set interfaces ge-3/2/4 unit 0 family inet address 100.2.5.2/24
set interfaces ge-3/2/4 unit 0 family iso
set interfaces ge-3/2/4 unit 0 family inet6 address 2001:100:2:5::2/64
set interfaces ge-3/2/4 unit 0 family mpls
set interfaces ge-0/1/5 unit 0 family inet address 100.3.5.2/24
set interfaces ge-0/1/5 unit 0 family iso
set interfaces ge-0/1/5 unit 0 family inet6 address 2001:100:3:5::2/64
set interfaces ge-0/1/5 unit 0 family mpls
set interfaces ge-3/1/0 unit 0 family inet address 100.4.5.2/24
set interfaces ge-3/1/0 unit 0 family iso
set interfaces ge-3/1/0 unit 0 family inet6 address 2001:100:4:5::2/64
set interfaces ge-3/1/0 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.166/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1006.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:166/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7

Copyright 2015, Juniper Networks, Inc.

57

IS-IS Feature Guide for Routing Devices

set protocols mpls admin-groups c8 8


set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-3/1/0 admin-group c1
set protocols mpls interface ge-3/1/0 admin-group c2
set protocols mpls interface ge-3/1/0 admin-group c4
set protocols mpls interface ge-3/0/1 srlg srlg3
set protocols mpls interface ge-3/0/1 srlg srlg4
set protocols isis interface ge-3/0/1 level 2 metric 51
set protocols isis interface ge-0/1/5 level 2 metric 13
set protocols isis interface ge-3/1/0 level 2 metric 10
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R6

58

set interfaces ge-0/0/6 unit 0 family inet address 100.0.6.2/24


set interfaces ge-0/0/6 unit 0 family iso
set interfaces ge-0/0/6 unit 0 family inet6 address 2001:100:0:6::2/64
set interfaces ge-0/0/6 unit 0 family mpls
set interfaces ge-3/0/1 unit 0 family inet address 100.2.6.2/24
set interfaces ge-3/0/1 unit 0 family iso
set interfaces ge-3/0/1 unit 0 family inet6 address 2001:100:2:6::2/64
set interfaces ge-3/0/1 unit 0 family mpls
set interfaces ge-0/0/4 unit 0 family inet address 100.3.6.2/24

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set interfaces ge-0/0/4 unit 0 family iso


set interfaces ge-0/0/4 unit 0 family inet6 address 2001:100:3:6::2/64
set interfaces ge-0/0/4 unit 0 family mpls
set interfaces ge-2/0/1 unit 0 family inet address 100.6.7.1/24
set interfaces ge-2/0/1 unit 0 family iso
set interfaces ge-2/0/1 unit 0 family inet6 address 2001:100:6:7::1/64
set interfaces ge-2/0/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.154/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1007.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:154/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15
set protocols mpls admin-groups c16 16
set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-2/0/1 srlg srlg2
set protocols mpls interface ge-2/0/1 srlg srlg3
set protocols mpls interface ge-2/0/1 srlg srlg4
set protocols mpls interface ge-2/0/1 srlg srlg5
set protocols mpls interface ge-2/0/1 admin-group c1
set protocols mpls interface ge-2/0/1 admin-group c2
set protocols mpls interface ge-2/0/1 admin-group c5
set protocols mpls interface ge-2/0/1 admin-group c11
set protocols isis interface ge-0/0/6 level 2 metric 52
set protocols isis interface ge-3/0/1 level 2 metric 12
set protocols isis interface ge-0/0/4 level 2 metric 15

Copyright 2015, Juniper Networks, Inc.

59

IS-IS Feature Guide for Routing Devices

set protocols isis interface ge-2/0/1 level 2 metric 10


set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

R7

60

set interfaces ge-2/1/0 unit 0 family inet address 100.0.7.2/24


set interfaces ge-2/1/0 unit 0 family iso
set interfaces ge-2/1/0 unit 0 family inet6 address 2001:100:0:7::2/64
set interfaces ge-2/1/0 unit 0 family mpls
set interfaces ge-2/3/9 unit 0 family inet address 100.1.7.2/24
set interfaces ge-2/3/9 unit 0 family iso
set interfaces ge-2/3/9 unit 0 family inet6 address 2001:100:1:7::2/64
set interfaces ge-2/3/9 unit 0 family mpls
set interfaces ge-2/1/7 unit 0 family inet address 100.2.7.2/24
set interfaces ge-2/1/7 unit 0 family iso
set interfaces ge-2/1/7 unit 0 family inet6 address 2001:100:2:7::2/64
set interfaces ge-2/1/7 unit 0 family mpls
set interfaces ge-2/2/2 unit 0 family inet address 100.3.7.2/24
set interfaces ge-2/2/2 unit 0 family iso
set interfaces ge-2/2/2 unit 0 family inet6 address 2001:100:3:7::2/64
set interfaces ge-2/2/2 unit 0 family mpls
set interfaces ge-2/3/0 unit 0 family inet address 100.6.7.2/24
set interfaces ge-2/3/0 unit 0 family iso
set interfaces ge-2/3/0 unit 0 family inet6 address 2001:100:6:7::2/64
set interfaces ge-2/3/0 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.102.180/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1008.00
set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:180/128
set interfaces lo0 unit 0 family mpls
set protocols rsvp interface all
set protocols mpls admin-groups c0 0
set protocols mpls admin-groups c1 1
set protocols mpls admin-groups c2 2
set protocols mpls admin-groups c3 3
set protocols mpls admin-groups c4 4
set protocols mpls admin-groups c5 5
set protocols mpls admin-groups c6 6
set protocols mpls admin-groups c7 7
set protocols mpls admin-groups c8 8
set protocols mpls admin-groups c9 9
set protocols mpls admin-groups c10 10
set protocols mpls admin-groups c11 11
set protocols mpls admin-groups c12 12
set protocols mpls admin-groups c13 13
set protocols mpls admin-groups c14 14
set protocols mpls admin-groups c15 15

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set protocols mpls admin-groups c16 16


set protocols mpls admin-groups c17 17
set protocols mpls admin-groups c18 18
set protocols mpls admin-groups c19 19
set protocols mpls admin-groups c20 20
set protocols mpls admin-groups c21 21
set protocols mpls admin-groups c22 22
set protocols mpls admin-groups c23 23
set protocols mpls admin-groups c24 24
set protocols mpls admin-groups c25 25
set protocols mpls admin-groups c26 26
set protocols mpls admin-groups c27 27
set protocols mpls admin-groups c28 28
set protocols mpls admin-groups c29 29
set protocols mpls admin-groups c30 30
set protocols mpls admin-groups c31 31
set protocols mpls interface all
set protocols mpls interface ge-2/3/9 srlg srlg8
set protocols mpls interface ge-2/3/9 admin-group c1
set protocols mpls interface ge-2/3/9 admin-group c2
set protocols mpls interface ge-2/3/9 admin-group c7
set protocols isis interface ge-2/1/0 level 2 metric 23
set protocols isis interface ge-2/1/7 level 2 metric 13
set protocols isis interface ge-2/2/2 level 2 metric 22
set protocols isis interface all level 2 metric 10
set routing-options srlg srlg1 srlg-value 101
set routing-options srlg srlg2 srlg-value 102
set routing-options srlg srlg3 srlg-value 103
set routing-options srlg srlg4 srlg-value 104
set routing-options srlg srlg5 srlg-value 105
set routing-options srlg srlg6 srlg-value 106
set routing-options srlg srlg7 srlg-value 107
set routing-options srlg srlg8 srlg-value 108
set routing-options srlg srlg9 srlg-value 109
set routing-options srlg srlg10 srlg-value 110
set routing-options srlg srlg11 srlg-value 111
set routing-options srlg srlg12 srlg-value 112

Configuring Device R3
Step-by-Step
Procedure

The following example requires that you navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device R3:
1.

Configure the interfaces.


[edit interfaces]
user@R3# set ge-1/3/5 unit 0 family inet address 100.2.3.2/24
user@R3# set ge-1/3/5 unit 0 family iso
user@R3# set ge-1/3/5 unit 0 family inet6 address 2001:100:2:3::2/64
user@R3# set ge-1/3/5 unit 0 family mpls
user@R3# set ge-0/3/1 unit 0 family inet address 100.3.4.1/24

Copyright 2015, Juniper Networks, Inc.

61

IS-IS Feature Guide for Routing Devices

user@R3# set ge-0/3/1 unit 0 family iso


user@R3# set ge-0/3/1 unit 0 family inet6 address 2001:100:3:4::1/64
user@R3# set ge-0/3/1 unit 0 family mpls
user@R3# set ge-0/3/6 unit 0 family inet address 100.3.5.1/24
user@R3# set ge-0/3/6 unit 0 family iso
user@R3# set ge-0/3/6 unit 0 family inet6 address 2001:100:3:5::1/64
user@R3# set ge-0/3/6 unit 0 family mpls
user@R3# set ge-2/0/4 unit 0 family inet address 100.3.6.1/24
user@R3# set ge-2/0/4 unit 0 family iso
user@R3# set ge-2/0/4 unit 0 family inet6 address 2001:100:3:6::1/64
user@R3# set ge-2/0/4 unit 0 family mpls
user@R3# set ge-1/1/0 unit 0 family inet address 100.3.7.1/24
user@R3# set ge-1/1/0 unit 0 family iso
user@R3# set ge-1/1/0 unit 0 family inet6 address 2001:100:3:7::1/64
user@R3# set ge-1/1/0 unit 0 family mpls
user@R3# set interfaces lo0 unit 0 family inet address 10.255.102.128/32
user@R3# set interfaces lo0 unit 0 family iso address 49.0001.0010.0100.1004.00
user@R3# set interfaces lo0 unit 0 family inet6 address abcd::10:255:102:128/128
user@R3# set interfaces lo0 unit 0 family mpls
2.

Configure routing policy.


[edit policy-options]
user@R3#set policy-statement ecmp term 1 then load-balance per-packet

3.

Enable RSVP on all the interfaces.


[edit protocols]
user@R3# set rsvp interface all

4.

Configure administrative groups.


[edit protocols mpls]
user@R3# set admin-groups c0 0
user@R3# set admin-groups c1 1
user@R3# set admin-groups c2 2
user@R3# set admin-groups c3 3
user@R3# set admin-groups c4 4
user@R3# set admin-groups c5 5
user@R3# set admin-groups c6 6
user@R3# set admin-groups c7 7
user@R3# set admin-groups c8 8
user@R3# set admin-groups c9 9
user@R3# set admin-groups c10 10
user@R3# set admin-groups c11 11
user@R3# set admin-groups c12 12
user@R3# set admin-groups c13 13
user@R3# set admin-groups c14 14
user@R3# set admin-groups c15 15
user@R3# set admin-groups c16 16
user@R3# set admin-groups c16 16
user@R3# set admin-groups c17 17

62

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

user@R3# set admin-groups c18 18


user@R3# set admin-groups c19 19
user@R3# set admin-groups c20 20
user@R3# set admin-groups c21 21
user@R3# set admin-groups c22 22
user@R3# set admin-groups c23 23
user@R3# set admin-groups c24 24
user@R3# set admin-groups c25 25
user@R3# set admin-groups c26 26
user@R3# set admin-groups c27 27
user@R3# set admin-groups c28 28
user@R3# set admin-groups c29 29
user@R3# set admin-groups c30 30
user@R3# set admin-groups c31 31
5.

Configure srlg values.


[edit routing-options]
user@R3# set srlg srlg1 srlg-value 101
user@R3# set srlg srlg2 srlg-value 102
user@R3# set srlg srlg3 srlg-value 103
user@R3# set srlg srlg4 srlg-value 104
user@R3# set srlg srlg5 srlg-value 105
user@R3# set srlg srlg6 srlg-value 106
user@R3# set srlg srlg7 srlg-value 107
user@R3# set srlg srlg8 srlg-value 108
user@R3# set srlg srlg9 srlg-value 109
user@R3# set srlg srlg10 srlg-value 110
user@R3# set srlg srlg11 srlg-value 111
user@R3# set srlg srlg12 srlg-value 112

6.

Enable MPLS on all the interfaces.


[edit protocols mpls]
user@R3# set interface all

7.

Configure srlg on the interfaces.


[edit protocols mpls]
user@R3# set interface ge-0/3/1 srlg srlg1
user@R3# set interface ge-0/3/1 srlg srlg2

8.

Configure administrative groups on the interfaces.


[edit protocols mpls]
user@R3# set interface ge-0/3/1 admin-group c1
user@R3# set interface ge-0/3/1 admin-group c2
user@R3# set interface ge-0/3/1 admin-group c3
user@R3# set interface ge-0/3/1 admin-group c5
user@R3# set interface ge-0/3/6 admin-group c1
user@R3# set interface ge-0/3/6 admin-group c2
user@R3# set interface ge-2/0/4 admin-group c1
user@R3# set interface ge-2/0/4 admin-group c2
user@R3# set interface ge-2/0/4 admin-group c5
user@R3# set interface ge-1/1/0 admin-group c2

Copyright 2015, Juniper Networks, Inc.

63

IS-IS Feature Guide for Routing Devices

user@R3# set interface ge-1/1/0 admin-group c12


9.

Enable link protection and configure metric values on the interfaces.


[edit protocols]
user@R3# set isis interface ge-1/3/5 link-protection
user@R3# set isis interface ge-0/3/1 level 2 metric 21
user@R3# set isis interface ge-0/3/6 level 2 metric 13
user@R3# set isis interface ge-2/0/4 level 2 metric 15
user@R3# set isis interface ge-1/1/0 level 2 metric 22

10.

Configure the metric value on all the interfaces.


[edit protocols]
user@R3# set isis interface all level 2 metric 10

11.

Apply the routing policy to all equal cost multi paths exported from the routing table
to the forwarding table.
[edit routing-options]
user@R3# set forwarding-table export ecmp

12.

Configure attributes of the backup selection policy.


[edit routing-options]
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
include-all c1
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
include-any c2
user@R3# set backup-selection destination 0.0.0.0/0 interface all admin-group
preference c3
user@R3# set backup-selection destination 0.0.0.0/0 interface all srlg loose
user@R3# set backup-selection destination 0.0.0.0/0 interface all
downstream-paths-only
user@R3# set backup-selection destination 0.0.0.0/0 interface all
bandwidth-greater-equal-primary
user@R3# set backup-selection destination 0.0.0.0/0 interface all neighbor
preference 10.255.102.178
user@R3# set backup-selection destination 0.0.0.0/0 interface all neighbor-tag
preference 1004
user@R3# set backup-selection destination 0.0.0.0/0 interface all metric-order
dest
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
admin-group
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
srlg
user@R3# set backup-selection destination 0.0.0.0/0 interface all evaluation-order
bandwidth
user@R3# set backup-selection destination 100.0.1.0/24 interface all srlg strict
user@R3# set backup-selection destination 100.0.1.0/24 interface all
bandwidth-greater-equal-primary
user@R3# set backup-selection destination 100.0.7.0/24 interface all srlg strict

Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.

64

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

user@R3# show interfaces


ge-1/3/5 {
unit 0 {
family inet {
address 100.2.3.2/24;
}
family iso;
family inet6 {
address 2001:100:2:3::2/64;
}
family mpls;
}
}
ge-0/3/1 {
unit 0 {
family inet {
address 100.3.4.1/24;
}
family iso;
family inet6{
address 2001:100:3:4::1/64;
}
family mpls;
}
}
ge-0/3/6 {
unit 0 {
family inet {
address 100.3.5.1/24;
}
family iso;
family inet6{
address 2001:100:3:5::1/64;
}
family mpls;
}
}
ge-2/0/4 {
unit 0 {
family inet {
address 100.3.6.1/24;
}
family iso;
family inet6{
address 2001:100:3:6::1/64;
}
family mpls;
}
}
ge-1/1/0 {
unit 0 {
family inet {
address 100.3.7.1/24;
}
family iso;
family inet6{

Copyright 2015, Juniper Networks, Inc.

65

IS-IS Feature Guide for Routing Devices

address 2001:100:3:7::1/64;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 10.255.102.128/32;
}
family iso {
address 49.0001.0010.0100.1004.00;
}
family inet6{
address abcd::10:255:102:128/128;
}
family mpls;
}
}
user@R3# show protocols
rsvp {
interface all;
}
mpls {
admin-groups {
c0 0;
c1 1;
c2 2;
c3 3;
c4 4;
c5 5;
c6 6;
c7 7;
c8 8;
c9 9;
c10 10;
c11 11;
c12 12;
c13 13;
c14 14;
c15 15;
c16 16;
c17 17;
c18 18;
c19 19;
c20 20;
c21 21;
c22 22;
c23 23;
c24 24;
c25 25;
c26 26;
c27 27;
c28 28;
c29 29;

66

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

c30 30;
c31 31;
}
interface all;
interface ge-0/3/1 {
srlg [ srlg1 srlg2 ];
admin-group [ c1 c2 c3 c5 ];
}
interface ge-0/3/6 {
admin-group [ c1 c2 ];
}
interface ge-2/0/4 {
admin-group [ c1 c2 c5 ];
}
interface ge-1/1/0 {
admin-group [ c2 c12 ];
}
isis {
interface ge-1/3/5 {
link-protection;
}
interface ge-0/3/1 {
level 2 metric 21;
}
interface ge-0/3/6 {
level 2 metric 13;
}
interface ge-2/0/4 {
level 2 metric 15;
}
interface ge-1/1/0 {
level 2 metric 22;
}
interface all {
level 2 metric 10;
}
}
user@R3# show routing-options
srlg {
srlg1 {
srlg-value 101;
}
srlg2 {
srlg-value 102;
}
srlg3 {
srlg-value 103;
}
srlg4 {
srlg-value 104;
}
srlg5 {
srlg-value 105;
}
srlg6 {

Copyright 2015, Juniper Networks, Inc.

67

IS-IS Feature Guide for Routing Devices

srlg-value 106;
}
srlg7 {
srlg-value 107;
}
srlg8 {
srlg-value 108;
}
srlg9 {
srlg-value 109;
}
srlg10 {
srlg-value 110;
}
srlg111 {
srlg-value 111;
}
srlg112 {
srlg-value 112;
}
}
backup-selection {
destination 0.0.0.0/0 {
interface all {
admin-group {
include-all c1;
include-any c2;
preference c3;
}
srlg loose;
downstream-paths-only;
bandwidth-greater-equal-primary;
neighbor {
preference 10.255.102.178;
}
neighbor-tag {
preference 1004;
}
metric-order dest;
evaluation-order [ admin-group srlg bandwidth ];
}
}
destination 100.0.1.0/24 {
interface all {
srlg strict;
bandwidth-greater-equal-primary;
}
}
destination 100.0.7.0/24 {
interface all {
srlg strict;
}
}
}

If you are done configuring the device, enter commit from configuration mode.

68

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Verification
Verify that the configuration is working properly.

Verifying the Routes on page 69

Verifying the IS-IS Route on page 73

Verifying the Backup SPF Roots for Device R3. on page 75

Verifying the Backup Selection Policy for Device R3 on page 77

Verifying the Routes


Purpose

Verify that the expected routes are learned.

Copyright 2015, Juniper Networks, Inc.

69

IS-IS Feature Guide for Routing Devices

Action

From operational mode, run the show route command for the routing table.
user@R3> show route
inet.0: 32 destinations, 32 routes (32 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.102.128/32
10.255.102.146/32

10.255.102.154/32
10.255.102.156/32

10.255.102.166/32
10.255.102.172/32
10.255.102.178/32
10.255.102.180/32
100.0.1.0/24

100.0.4.0/24
100.0.5.0/24
100.0.6.0/24
100.0.7.0/24
100.1.2.0/24
100.1.4.0/24

100.1.7.0/24

100.2.3.0/24
100.2.3.2/32
100.2.4.0/24
100.2.5.0/24
100.2.6.0/24
100.2.7.0/24
100.3.4.0/24
100.3.4.1/32

70

*[Direct/0] 1w0d 04:14:44


> via lo0.31
*[IS-IS/18] 6d 07:19:57, metric 40
> to 100.2.3.1 via ge-1/3/5.0
to 100.3.4.2 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:12:02, metric 25
> to 100.3.6.2 via ge-2/0/4.0
*[IS-IS/18] 06:38:55, metric 30
> to 100.2.3.1 via ge-1/3/5.0
to 100.3.6.2 via ge-2/0/4.0
*[IS-IS/18] 1w0d 04:11:57, metric 23
> to 100.3.5.2 via ge-0/3/6.0
*[IS-IS/18] 1w0d 04:12:03, metric 31
> to 100.3.4.2 via ge-0/3/1.0
*[IS-IS/18] 06:38:55, metric 20
> to 100.2.3.1 via ge-1/3/5.0
*[IS-IS/18] 1w0d 04:12:51, metric 32
> to 100.3.7.2 via ge-1/1/0.0
*[IS-IS/18] 1w0d 04:11:57, metric 30
> to 100.2.3.1 via ge-1/3/5.0
to 100.3.4.2 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:12:03, metric 39
> to 100.3.4.2 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:11:57, metric 64
> to 100.3.5.2 via ge-0/3/6.0
*[IS-IS/18] 1w0d 04:12:02, metric 67
> to 100.3.6.2 via ge-2/0/4.0
*[IS-IS/18] 1w0d 04:12:51, metric 45
> to 100.3.7.2 via ge-1/1/0.0
*[IS-IS/18] 06:38:55, metric 20
> to 100.2.3.1 via ge-1/3/5.0
*[IS-IS/18] 06:38:55, metric 30
> to 100.2.3.1 via ge-1/3/5.0
to 100.3.6.2 via ge-2/0/4.0
*[IS-IS/18] 06:38:55, metric 30
> to 100.2.3.1 via ge-1/3/5.0
to 100.3.6.2 via ge-2/0/4.0
*[Direct/0] 1w0d 04:13:11
> via ge-1/3/5.0
*[Local/0] 1w0d 04:13:11
Local via ge-1/3/5.0
*[IS-IS/18] 06:38:55, metric 22
> to 100.2.3.1 via ge-1/3/5.0
*[IS-IS/18] 06:38:55, metric 20
> to 100.2.3.1 via ge-1/3/5.0
*[IS-IS/18] 06:38:55, metric 22
> to 100.2.3.1 via ge-1/3/5.0
*[IS-IS/18] 06:38:55, metric 23
> to 100.2.3.1 via ge-1/3/5.0
*[Direct/0] 1w0d 04:13:10
> via ge-0/3/1.0
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/1.0

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

100.3.5.0/24
100.3.5.1/32
100.3.6.0/24
100.3.6.1/32
100.3.7.0/24
100.3.7.1/32
100.4.5.0/24
100.6.7.0/24

*[Direct/0] 1w0d 04:13:10


> via ge-0/3/6.0
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/6.0
*[Direct/0] 1w0d 04:13:10
> via ge-2/0/4.0
*[Local/0] 1w0d 04:13:10
Local via ge-2/0/4.0
*[Direct/0] 1w0d 04:13:10
> via ge-1/1/0.0
*[Local/0] 1w0d 04:13:10
Local via ge-1/1/0.0
*[IS-IS/18] 1w0d 04:11:57, metric 23
> to 100.3.5.2 via ge-0/3/6.0
*[IS-IS/18] 1w0d 04:12:02, metric 25
> to 100.3.6.2 via ge-2/0/4.0

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.0010.0100.1004/72
*[Direct/0] 1w0d 04:14:44
> via lo0.0
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0
1
2
13

*[MPLS/0] 1w0d
Receive
*[MPLS/0] 1w0d
Receive
*[MPLS/0] 1w0d
Receive
*[MPLS/0] 1w0d
Receive

04:14:47, metric 1
04:14:47, metric 1
04:14:47, metric 1
04:14:47, metric 1

inet6.0: 39 destinations, 43 routes (39 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
2001:100:0:1::/64

2001:100:0:4::/64
2001:100:0:5::/64
2001:100:0:6::/64
2001:100:0:7::/64
2001:100:1:2::/64

2001:100:1:4::/64

2001:100:1:7::/64

2001:100:2:3::/64

Copyright 2015, Juniper Networks, Inc.

*[IS-IS/18] 1w0d 04:11:57, metric 30


> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:12:03, metric 39
> to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:11:57, metric 64
> to fe80::2a0:a514:0:3549 via ge-0/3/6.0
*[IS-IS/18] 1w0d 04:12:02, metric 67
> to fe80::2a0:a514:0:3f49 via ge-2/0/4.0
*[IS-IS/18] 1w0d 04:12:51, metric 45
> to fe80::2a0:a514:0:4949 via ge-1/1/0.0
*[IS-IS/18] 1w0d 04:11:57, metric 20
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
*[IS-IS/18] 1w0d 04:11:57, metric 30
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
*[IS-IS/18] 1w0d 04:11:57, metric 30
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
*[Direct/0] 1w0d 04:13:00
> via ge-1/3/5.0

71

IS-IS Feature Guide for Routing Devices

2001:100:2:3::2/128*[Local/0] 1w0d 04:13:11


Local via ge-1/3/5.0
2001:100:2:4::/64 *[IS-IS/18] 1w0d 04:11:57, metric 22
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
2001:100:2:5::/64 *[IS-IS/18] 1w0d 04:11:57, metric 20
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
2001:100:2:6::/64 *[IS-IS/18] 1w0d 04:11:57, metric 22
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
2001:100:2:7::/64 *[IS-IS/18] 1w0d 04:11:57, metric 23
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
2001:100:3:4::/64 *[Direct/0] 1w0d 04:12:59
> via ge-0/3/1.0
2001:100:3:4::1/128*[Local/0] 1w0d 04:13:10
Local via ge-0/3/1.0
2001:100:3:5::/64 *[Direct/0] 1w0d 04:12:59
> via ge-0/3/6.0
2001:100:3:5::1/128*[Local/0] 1w0d 04:13:10
Local via ge-0/3/6.0
2001:100:3:6::/64 *[Direct/0] 1w0d 04:12:59
> via ge-2/0/4.0
2001:100:3:6::1/128*[Local/0] 1w0d 04:13:10
Local via ge-2/0/4.0
2001:100:3:7::/64 *[Direct/0] 1w0d 04:12:59
> via ge-1/1/0.0
2001:100:3:7::1/128*[Local/0] 1w0d 04:13:10
Local via ge-1/1/0.0
2001:100:4:5::/64 *[IS-IS/18] 1w0d 04:11:57, metric 23
> to fe80::2a0:a514:0:3549 via ge-0/3/6.0
2001:100:6:7::/64 *[IS-IS/18] 1w0d 04:12:02, metric 25
> to fe80::2a0:a514:0:3f49 via ge-2/0/4.0
abcd::10:255:102:128/128
*[Direct/0] 1w0d 04:14:43
> via lo0.0
abcd::10:255:102:146/128
*[IS-IS/18] 1w0d 04:11:57, metric 40
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
abcd::10:255:102:154/128
*[IS-IS/18] 1w0d 04:12:02, metric 25
> to fe80::2a0:a514:0:3f49 via ge-2/0/4.0
abcd::10:255:102:156/128
*[IS-IS/18] 1w0d 04:11:57, metric 30
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
abcd::10:255:102:166/128
*[IS-IS/18] 1w0d 04:11:57, metric 23
> to fe80::2a0:a514:0:3549 via ge-0/3/6.0
abcd::10:255:102:172/128
*[IS-IS/18] 1w0d 04:12:03, metric 31
> to fe80::2a0:a514:0:2b49 via ge-0/3/1.0
abcd::10:255:102:178/128
*[IS-IS/18] 1w0d 04:11:57, metric 20
> to fe80::2a0:a514:0:1749 via ge-1/3/5.0
to fe80::2a0:a514:0:3549 via ge-0/3/6.0
abcd::10:255:102:180/128
*[IS-IS/18] 1w0d 04:12:51, metric 32
> to fe80::2a0:a514:0:4949 via ge-1/1/0.0

72

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

fe80::/64

*[Direct/0] 1w0d 04:13:00


> via ge-1/3/5.0
[Direct/0] 1w0d 04:12:59
> via ge-0/3/1.0
[Direct/0] 1w0d 04:12:59
> via ge-0/3/6.0
[Direct/0] 1w0d 04:12:59
> via ge-2/0/4.0
[Direct/0] 1w0d 04:12:59
> via ge-1/1/0.0
fe80::2a0:a50f:fc64:7649/128
*[Direct/0] 1w0d 04:14:43
> via lo0.0
fe80::2a0:a514:0:2049/128
*[Local/0] 1w0d 04:13:11
Local via ge-1/3/5.0
fe80::2a0:a514:0:2249/128
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/1.0
fe80::2a0:a514:0:2349/128
*[Local/0] 1w0d 04:13:10
Local via ge-0/3/6.0
fe80::2a0:a514:0:2449/128
*[Local/0] 1w0d 04:13:10
Local via ge-2/0/4.0
fe80::2a0:a514:0:2549/128
*[Local/0] 1w0d 04:13:10
Local via ge-1/1/0.0

Meaning

The output shows all Device R3 routes.

Verifying the IS-IS Route


Purpose

Verify the routing table of IS-IS.

Copyright 2015, Juniper Networks, Inc.

73

IS-IS Feature Guide for Routing Devices

Action

From operational mode, run the show isis route command for Device R3.
user@R3> show isis route
IS-IS routing table
IPv4/IPv6 Routes
---------------Prefix
L Version
10.255.102.146/32 2
5023

74

Current version: L1: 0 L2: 5023

Metric Type Interface


40 int ge-1/3/5.0
ge-0/3/1.0

NH Via Backup Score


IPV4 R2
IPV4 R4 0000000000200000

10.255.102.154/32
10.255.102.156/32

2
2

5023
5023

25 int
30 int

ge-2/0/4.0
ge-1/3/5.0
ge-2/0/4.0

IPV4 R6
IPV4 R2
IPV4 R6 0000000000000000

10.255.102.166/32
10.255.102.172/32
10.255.102.178/32
10.255.102.180/32
100.0.1.0/24

2
2
2
2
2

5023
5023
5023
5023
5023

23
31
20
32
30

int
int
int
int
int

ge-0/3/6.0
ge-0/3/1.0
ge-1/3/5.0
ge-1/1/0.0
ge-1/3/5.0
ge-0/3/1.0

IPV4
IPV4
IPV4
IPV4
IPV4
IPV4

R5
R4
R2
R7
R2
R4 0000000002003100

100.0.4.0/24
100.0.5.0/24
100.0.6.0/24
100.0.7.0/24
100.1.2.0/24
100.1.4.0/24

2
2
2
2
2
2

5023
5023
5023
5023
5023
5023

39
64
67
45
20
30

int
int
int
int
int
int

ge-0/3/1.0
ge-0/3/6.0
ge-2/0/4.0
ge-1/1/0.0
ge-1/3/5.0
ge-1/3/5.0
ge-2/0/4.0

IPV4
IPV4
IPV4
IPV4
IPV4
IPV4
IPV4

R4
R5
R6
R7
R2
R2
R6 0000000000000000

100.1.7.0/24

5023

30 int

ge-1/3/5.0
ge-2/0/4.0

IPV4 R2
IPV4 R6 0000000000000000

100.2.4.0/24
100.2.5.0/24
100.2.6.0/24
100.2.7.0/24
100.4.5.0/24
100.6.7.0/24
2001:100:0:1::/64

2
2
2
2
2
2
2

5023
5023
5023
5023
5023
5023
5023

22
20
22
23
23
25
30

int
int
int
int
int
int
int

2001:100:0:4::/64
2001:100:0:5::/64
2001:100:0:6::/64
2001:100:0:7::/64
2001:100:1:2::/64

2
2
2
2
2

5023
5023
5023
5023
5023

39
64
67
45
20

int
int
int
int
int

2001:100:1:4::/64

5023

30 int

2001:100:1:7::/64

5023

30 int

2001:100:2:4::/64

5023

22 int

2001:100:2:5::/64

5023

20 int

2001:100:2:6::/64

5023

22 int

2001:100:2:7::/64

5023

23 int

2001:100:4:5::/64

5023

23 int

ge-1/3/5.0
ge-1/3/5.0
ge-1/3/5.0
ge-1/3/5.0
ge-0/3/6.0
ge-2/0/4.0
ge-1/3/5.0
ge-0/3/1.0
ge-0/3/1.0
ge-0/3/6.0
ge-2/0/4.0
ge-1/1/0.0
ge-1/3/5.0
ge-0/3/6.0
ge-1/3/5.0
ge-0/3/1.0
ge-1/3/5.0
ge-0/3/1.0
ge-1/3/5.0
ge-0/3/6.0
ge-1/3/5.0
ge-0/3/6.0
ge-1/3/5.0
ge-0/3/6.0
ge-1/3/5.0
ge-0/3/6.0
ge-0/3/6.0

IPV4
IPV4
IPV4
IPV4
IPV4
IPV4
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6
IPV6

R2
R2
R2
R2
R5
R6
R2
R4
R4
R5
R6
R7
R2
R5
R2
R4
R2
R4
R2
R5
R2
R5
R2
R5
R2
R5
R5

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

2001:100:6:7::/64 2
5023
25 int ge-2/0/4.0
abcd::10:255:102:146/128 2 5023 40 int ge-1/3/5.0 IPV6
ge-0/3/1.0
abcd::10:255:102:154/128 2 5023 25 int ge-2/0/4.0 IPV6
abcd::10:255:102:156/128 2 5023 30 int ge-1/3/5.0 IPV6
ge-0/3/1.0
abcd::10:255:102:166/128 2 5023 23 int ge-0/3/6.0 IPV6
abcd::10:255:102:172/128 2 5023 31 int ge-0/3/1.0 IPV6
abcd::10:255:102:178/128 2 5023 20 int ge-1/3/5.0 IPV6
ge-0/3/6.0
abcd::10:255:102:180/128 2 5023 32 int ge-1/1/0.0 IPV6

Meaning

IPV6 R6
R2
IPV6 R4
R6
R2
IPV6 R4
R5
R4
R2
IPV6 R5
R7

The output displays the routing table of IS-IS routers.

Verifying the Backup SPF Roots for Device R3.


Purpose

Verify the potential IS-IS backup SPF roots for Device R3.

Copyright 2015, Juniper Networks, Inc.

75

IS-IS Feature Guide for Routing Devices

Action

From operational mode, run the show isis backup spf results command for Device R3.
user@R3> show isis backup spf results
IS-IS level 1 SPF results:
0 nodes
IS-IS level 2 SPF results:
R0.00
Primary next-hop: ge-1/3/5, IPV4, R2, SNPA: b0:c6:9a:2a:f4:bc
Primary next-hop: ge-1/3/5, IPV6, R2, SNPA: b0:c6:9a:2a:f4:bc
Root: R4, Root Metric: 21, Metric: 18, Root Preference: 0x0
track-item: R4.04-00, track-item-isnbr: R4.00
track-item: R0.00-00, track-item-isnbr: R6.03
Eligible, Backup next-hop: ge-0/3/1, IPV4, R4, SNPA: b0:c6:9a:2a:f4:bd
Eligible, Backup next-hop: ge-0/3/1, IPV6, R4, SNPA: b0:c6:9a:2a:f4:bd
Root: R2, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: R2.02-00, track-item-isnbr: R2.00
track-item: R1.02-00
track-item: R1.00-00, track-item-isnbr: R2.02
track-item: R0.00-00, track-item-isnbr: R1.02
Not eligible, IPV4, Reason: Primary next-hop link fate sharing
Not eligible, IPV6, Reason: Primary next-hop link fate sharing
Root: R7, Root Metric: 22, Metric: 20, Root Preference: 0x0
track-item: R7.05-00, track-item-isnbr: R7.00
track-item: R1.02-00
track-item: R1.00-00
track-item: R0.00-00, track-item-isnbr: R1.02
Eligible, Backup next-hop: ge-1/1/0, IPV4, R7, SNPA: b0:c6:9a:2a:f4:bd
Eligible, Backup next-hop: ge-1/1/0, IPV6, R7, SNPA: b0:c6:9a:2a:f4:bd
Root: R5, Root Metric: 13, Metric: 28, Root Preference: 0x0
track-item: R5.03-00, track-item-isnbr: R5.00
track-item: R4.04-00, track-item-isnbr: R4.00
track-item: R4.00-00
track-item: R0.00-00, track-item-isnbr: R6.03
Eligible, Backup next-hop: ge-0/3/6, IPV4, R5, SNPA: b0:c6:9a:2a:f4:bd
Eligible, Backup next-hop: ge-0/3/6, IPV6, R5, SNPA: b0:c6:9a:2a:f4:bd
Root: R6, Root Metric: 15, Metric: 30, Root Preference: 0x0
track-item: R7.05-00, track-item-isnbr: R7.00
track-item: R7.04-00, track-item-isnbr: R6.00
track-item: R7.00-00
track-item: R1.02-00
track-item: R1.00-00
track-item: R0.00-00, track-item-isnbr: R1.02
Eligible, Backup next-hop: ge-2/0/4, IPV4, R6, SNPA: b0:c6:9a:2a:f4:bd
Eligible, Backup next-hop: ge-2/0/4, IPV6, R6, SNPA: b0:c6:9a:2a:f4:bd
R7.00
Primary next-hop: ge-1/1/0, IPV4, R7, SNPA: b0:c6:9a:2a:f4:bd
Primary next-hop: ge-1/1/0, IPV6, R7, SNPA: b0:c6:9a:2a:f4:bd
Root: R7, Root Metric: 22, Metric: 0, Root Preference: 0x0
Not eligible, IPV4, Reason: Interface protection not configured
Not eligible, IPV6, Reason: Interface protection not configured
Root: R6, Root Metric: 15, Metric: 10, Root Preference: 0x0
track-item: R7.04-00, track-item-isnbr: R6.00
track-item: R7.00-00
. . .

Meaning

76

The output displays the root calculations through each directly connected router.

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Verifying the Backup Selection Policy for Device R3


Action

From operational mode, run the show backup-selection command for Device R3.
user@R3> show backup-selection
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Neighbor preference: 10.255.102.178
Neighbor-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Neighbor,
Metric, Neighbor-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Neighbor,
Metric, Neighbor-Tag

Meaning

Related
Documentation

The output displays the configured policies per prefix per primary next-hop interface.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

backup-selection (Protocols ISIS) on page 322

Configuring Backup Selection Policy for the IS-IS Protocol


Support for IS-IS loop-free alternate (LFA) routes essentially adds IP fast-reroute
capability for IS-IS. Junos OS precomputes multiple loop-free backup routes for all IS-IS
routes. These backup routes are pre-installed in the Packet Forwarding Engine, which
performs a local repair and implements the backup path when the link for a primary next
hop for a particular route is no longer available. The selection of LFA is done randomly
by selecting any matching LFA to progress to the given destination. This does not ensure
best backup coverage available for the network. In order to choose the best LFA, Junos
OS allows you to configure network-wide backup selection policies for each destination
(IPv4 and IPv6) and a primary next-hop interface. These policies are evaluated based
on admin-group, srlg, bandwidth, protection-type, metric, and neighbor information.
Before you begin to configure the backup selection policy for the IS-IS protocol:

Copyright 2015, Juniper Networks, Inc.

77

IS-IS Feature Guide for Routing Devices

Configure the router interfaces. See the Junos OS Network Management Administration
Guide for Routing Devices

Configure an interior gateway protocol or static routing. See the Junos OS Routing
Protocols Library for Routing Devices

To configure the backup selection policy for the IS-IS protocol:


1.

Configure per-packet load balancing.


[edit policy-options]
user@host# set policy-statement ecmp term 1 then load-balance per-packet

2. Enable RSVP on all the interfaces.

[edit protocols]
user@host# set rsvp interface all
3. Configure administrative groups.

[edit protocols mpls]


user@host# set admin-groups group-name
4. Configure srlg values.

[edit routing-options]
user@host# set srlg srlg-name srlg-value srlg-value
5. Enable MPLS on all the interfaces.

[edit protocols mpls]


user@host# set interface all
6. Configure srlg on the interfaces.

[edit protocols mpls]


user@host# set interface interface-name srlg srlg-name
7. Configure the administrative groups on the interfaces.

[edit protocols mpls]


user@host# set interface interface-name admin-group group-name
8. Enable link protection and configure the metric value on all the interfaces.

[edit protocols]
user@host# set isis interface all level 2 metric 10
9. Apply the routing policy to all equal cost multipaths exported from the routing table

to the forwarding table.


[edit routing-options]
user@host# set forwarding-table export ecmp
10. Configure the administrative group of the backup selection policy for an IP address.

You can choose to exclude, include all, include any, or prefer the administrative groups
from the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
admin-group

78

Specify the administrative group to be excluded.

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

[edit routing-options backup-selection destination ip-address interface interface-name


admin-group]
user@host# set exclude group-name

The backup path is not selected as the loop-free alternate (LFA) or backup nexthop
if any of the links in the path have any one of the listed administrative groups.
For example, to exclude the group c1 from the administrative group:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
admin-group]
user@host# set exclude c1

Configure all the administrative groups if each link in the backup path requires all
the listed administrative groups in order to accept the path.
[edit routing-options backup-selection destination ip-address interface interface-name
admin-group]
user@host# set include-all group-name

For example, to set all the administrative groups if each link requires all the listed
administrative groups in order to accept the path:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
admin-group]
user@host# set include-all c2

Configure any administrative group if each link in the backup path requires at least
one of the listed administrative groups in order to select the path.
[edit routing-options backup-selection destination ip-address interface interface-name
admin-group]
user@host# set include-any group-name

For example, to set any administrative group if each link in the backup path requires
at least one of the listed administrative groups in order to select the path:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
admin-group]
user@host# set include-any c3

Define an ordered set of administrative group that specifies the preference of the
backup path.
The leftmost element in the set is given the highest preference.
[edit routing-options backup-selection destination ip-address interface interface-name
admin-group]
user@host# set preference group-name

For example, to set an ordered set of administrative group that specifies the
preference of the backup path:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
admin-group]
user@host# set preference c4
11. Configure the backup path to allow the selection of the backup next hop only if the

bandwidth is greater than or equal to the bandwidth of the primary next hop.
[edit routing-options]

Copyright 2015, Juniper Networks, Inc.

79

IS-IS Feature Guide for Routing Devices

user@host# set backup-selection destination ip-address interface interface-name


bandwidth-greater-equal-primary
12. Configure the backup path to specify the metric from the one-hop neighbor or from

the remote router such as an RSVP backup label-switched-path (LSP) tail-end router
to the final destination.
The destination metric can be either highest or lowest.

Configure the backup path that has the highest destination metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
dest-metric highest

Configure the backup path that has the lowest destination metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
dest-metric lowest

13. Configure the backup path that is a downstream path to the destination.

[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
downstream-paths-only
14. Set the order of preference of the root and the destination metric during backup path

selection.
The preference order can be :

[root dest] Backup path selection or preference is first based on the root-metric
criteria. If the criteria of all the root-metric is the same, then the selection or
preference is based on the dest-metric.

[dest root] Backup path selection or preference is first based on the dest-metric
criteria. If the criteria of all the dest-metric is the same, then the selection is based
on the root-metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
metric-order root
user@host# set backup-selection destination ip-address interface interface-name
metric-order dest

15. Configure the backup path to define a list of loop-back IP addresses of the adjacent

neighbors to either exclude or prefer in the backup path selection.


The neighbor can be a local (adjacent router) neighbor, remote neighbor, or any other
router in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
neighbor

Configure the list of neighbors to be excluded.


[edit routing-options backup-selection destination ip-address interface interface-name
neighbor]
user@host# set exclude neighbor-address

80

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

The backup path that has a router from the list is not selected as the loop-free
alternative or backup next hop.

Configure an ordered set of neighbors to be preferred.


[edit routing-options backup-selection destination ip-address interface interface-name
neighbor]
user@host# set preference neighbor-address

The backup path having the leftmost neighbor is selected.


16. Define the backup path per-neighbor policy, to either exclude or prefer a backup path.

[edit routing-options]
user@host# set backup-selection destination ip-address interface all neighbor-tag

Configure to not select the backup path as the loop-free alternative or backup-next
hop if any node or router with route-tag is present in the path.
[edit routing-options backup-selection destination ip-address interface interface-name
neighbor-tag]
user@host# set exclude route-tag

For example, to not select the backup path as the loop-free alternative or
backup-next hop if any node or router with 1004 route-tag is present in the path:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
neighbor-tag]
user@host# set exclude 1004

Configure the set of route tags in descending order of preference.


[edit routing-options backup-selection destination ip-address interface interface-name
neighbor-tag]
user@host# set preference route-tag

For example, to configure the set of route tags in descending order of preference:
[edit routing-options backup-selection destination 0.0.0.0/0 interface all
neighbor-tag]
user@host# set preference 1006
17. Configure the backup path to specify the required protection type of the backup path

to be link, node, or node-link.

Select the backup path that provides link protection.


[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
protection-type link

Select the backup path that provides node protection.


[edit routing-options]
user@host# set backup-selection destination ip-address interface interface-name
protection-type node

Select the backup path that allows either node or link protection LFA where
node-protection LFA is preferred over link-protection LFA.
[edit routing-options]

Copyright 2015, Juniper Networks, Inc.

81

IS-IS Feature Guide for Routing Devices

user@host# set backup-selection destination ip-address interface interface-name


protection-type node-link
18. Specify the metric to the one-hop neighbor or to the remote router such as an RSVP

backup label-switched-path (LSP) tail-end router.

Select the path with highest root metric.


[edit routing-options]
user@host# set backup-selection destination ip-address interface all root-metric
highest

Select the path with lowest root metric.


[edit routing-options]
user@host# set backup-selection destination ip-address interface all root-metric
lowest

19. Configure the backup selection path to either allow or reject the common shared risk

link groups (SRLGs) between the primary link and each link in the backup path.

Configure the backup path to allow common srlgs between the primary link and
each link in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all srlg loose

A backup path with a fewer number of srlg collisions is preferred.

Configure the backup path to reject the backup path that has common srlgs between
the primary link and each link in the backup path.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all srlg strict

20. Configure the backup path to control the order and the criteria of evaluating the backup

path based on the administrative group, srlg, bandwidth, protection type, neighbor,
neighbor-tag, and metric. The default order of evaluation is admin-group, srlg,
bandwidth, protection-type, neighbor, neighbor-tag, and metric.
[edit routing-options]
user@host# set backup-selection destination ip-address interface all evaluation-order
admin-group
user@host# set backup-selection destination ip-address interface all evaluation-order
srlg
user@host# set backup-selection destination ip-address interface all evaluation-order
bandwidth

Related
Documentation

82

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Example: Redistributing OSPF Routes into IS-IS


This example shows how to redistribute OSPF routes into an IS-IS network.

Requirements on page 83

Overview on page 83

Configuration on page 84

Verification on page 89

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Export policy can be applied to IS-IS to facilitate route redistribution.
Junos OS does not support the application of import policy for link-state routing protocols
like IS-IS because such policies can lead to inconsistent link-state database (LSDB)
entries, which in turn can result in routing inconstancies.
In this example, OSPF routes 192.168.0/24 through 192.168.3/24 are redistributed into
IS-IS area 49.0002 from Device R2.
In addition, policies are configured to ensure that Device R1 can reach destinations on
the 10.0.0.44/30 network, and that Device R3 can reach destinations on the 10.0.0.36/30
network. This enables end-to-end reachability.
Figure 8 on page 84 shows the topology used in this example.

Copyright 2015, Juniper Networks, Inc.

83

IS-IS Feature Guide for Routing Devices

Figure 8: IS-IS Route Redistribution Topology


IS-IS
49.0002

lo0:172.16.3.5
fe-1/2/0
.38
R1

10.0.0.36/30

lo0:172.16.9.7
fe-1/2/1
.37
R2
.45 fe-1/2/0

10.0.0.44/30
.46

fe-1/2/0

OSPF
(192.168.0-3/24)

g041258

R3

CLI Quick Configuration on page 84 shows the configuration for all of the devices in
Figure 8 on page 84. The section Step-by-Step Procedure on page 85 describes the
steps on Device R2. Step-by-Step Procedure on page 86 describes the steps on Device
R3.

Configuration
CLI Quick
Configuration

84

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

set interfaces fe-1/2/0 unit 0 description to-R7


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.38/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 172.16.3.5/32
set interfaces lo0 unit 0 family iso address 49.0002.0172.0016.0305.00
set protocols isis interface fe-1/2/0.0
set protocols isis interface lo0.0

Device R2

set interfaces fe-1/2/1 unit 0 description to-R5


set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.37/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/0 unit 0 description to-OSPF-network
set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.45/30
set interfaces lo0 unit 0 family inet address 172.16.9.7/32
set interfaces lo0 unit 0 family iso address 49.0002.0172.0016.0907.00
set protocols isis export ospf-isis
set protocols isis export send-direct-to-isis-neighbors
set protocols isis interface fe-1/2/1.0
set protocols isis interface lo0.0

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set protocols ospf export send-direct-to-ospf-neighbors


set protocols ospf area 0.0.0.1 interface fe-1/2/0.0
set protocols ospf area 0.0.0.1 interface lo0.0 passive
set policy-options policy-statement ospf-isis term 1 from protocol ospf
set policy-options policy-statement ospf-isis term 1 from route-filter 192.168.0.0/22
longer
set policy-options policy-statement ospf-isis term 1 then accept
set policy-options policy-statement send-direct-to-isis-neighbors from protocol direct
set policy-options policy-statement send-direct-to-isis-neighbors from route-filter
10.0.0.44/30 exact
set policy-options policy-statement send-direct-to-isis-neighbors then accept
set policy-options policy-statement send-direct-to-ospf-neighbors from protocol direct
set policy-options policy-statement send-direct-to-ospf-neighbors from route-filter
10.0.0.36/30 exact
set policy-options policy-statement send-direct-to-ospf-neighbors then accept

Device R3

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.46/30


set interfaces lo0 unit 0 family inet address 192.168.1.1/32
set interfaces lo0 unit 0 family inet address 192.168.2.1/32
set interfaces lo0 unit 0 family inet address 192.168.3.1/32
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set protocols ospf export ospf
set protocols ospf area 0.0.0.1 interface fe-1/2/0.0
set protocols ospf area 0.0.0.1 interface lo0.0 passive
set policy-options policy-statement ospf term 1 from protocol static
set policy-options policy-statement ospf term 1 then accept
set routing-options static route 192.168.0.0/24 discard
set routing-options static route 192.168.1.0/24 discard
set routing-options static route 192.168.3.0/24 discard
set routing-options static route 192.168.2.0/24 discard

To configure Device R2:


1.

Configure the network interfaces.


[edit interfaces]
user@R2# set fe-1/2/1 unit 0 description to-R5
user@R2# set fe-1/2/1 unit 0 family inet address 10.0.0.37/30
user@R2# set fe-1/2/1 unit 0 family iso
user@R2# set fe-1/2/0 unit 0 description to-OSPF-network
user@R2# set fe-1/2/0 unit 0 family inet address 10.0.0.45/30
user@R2# set lo0 unit 0 family inet address 172.16.9.7/32
user@R2# set lo0 unit 0 family iso address 49.0002.0172.0016.0907.00

2.

Configure IS-IS on the interface facing Device R1 and the loopback interface.
[edit protocols isis]
user@R2# set interface fe-1/2/1.0
user@R2# set interface lo0.0

3.

Configure the policy that enables Device R1 to reach the 10.0.0.44/30 network.
[edit policy-options policy-statement send-direct-to-isis-neighbors]
user@R2# set from protocol direct
user@R2# set from route-filter 10.0.0.44/30 exact
user@R2# set then accept

4.

Apply the policy that enables Device R1 to reach the 10.0.0.44/30 network.

Copyright 2015, Juniper Networks, Inc.

85

IS-IS Feature Guide for Routing Devices

[edit protocols isis]


user@R2# set export send-direct-to-isis-neighbors
5.

Configure OSPF on the interfaces.


[edit protocols ospf]
user@R2# set area 0.0.0.1 interface fe-1/2/0.0
user@R2# set area 0.0.0.1 interface lo0.0 passive

6.

Configure the OSPF route redistribution policy.


[edit policy-options policy-statement ospf-isis term 1]
user@R2# set from protocol ospf
user@R2# set from route-filter 192.168.0.0/22 longer
user@R2# set then accept

7.

Apply the OSPF route redistribution policy to the IS-IS instance.


[edit protocols isis]
user@R2# set export ospf-isis

8.

Configure the policy that enables Device R3 to reach the 10.0.0.36/30 network.
[edit policy-options policy-statement send-direct-to-ospf-neighbors]
user@R2# set from protocol direct
user@R2# set from route-filter 10.0.0.36/30 exact
user@R2# set then accept

9.

Apply the policy that enables Device R3 to reach the 10.0.0.36/30 network.
[edit protocols ospf]
user@R2# set export send-direct-to-ospf-neighbors

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure multi-level IS-IS:
1.

Configure the network interfaces.


Multiple addresses are configured on the loopback interface to simulate multiple
route destinations.
[edit interfaces]
user@R3# set fe-1/2/0 unit 0 family inet address 10.0.0.46/30
user@R3# set lo0 unit 0 family inet address 192.168.1.1/32
user@R3# set lo0 unit 0 family inet address 192.168.2.1/32
user@R3# set lo0 unit 0 family inet address 192.168.3.1/32
user@R3# set lo0 unit 0 family inet address 192.168.0.1/32

2.

Configure static routes to the loopback interface addresses.


These are the routes that are redistributed into IS-IS.
[edit routing-options static]
user@R3# set route 192.168.0.0/24 discard
user@R3# set route 192.168.1.0/24 discard
user@R3# set route 192.168.3.0/24 discard
user@R3# set route 192.168.2.0/24 discard

86

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

3.

Configure OSPF on the interfaces.


[edit protocols ospf area 0.0.0.1]
user@R3# set interface fe-1/2/0.0
user@R3# set interface lo0.0 passive

4.

Configure the OSPF policy to export the static routes.


[edit policy-options policy-statement ospf term 1]
user@R3# set from protocol static
user@R3# set then accept

5.

Apply the OSPF export policy.


[edit protocols ospf]
user@R3# set export ospf

Results

Device R2

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
user@R2# show interfaces
fe-1/2/1 {
unit 0 {
description to-R5;
family inet {
address 10.0.0.37/30;
}
family iso;
}
}
fe-1/2/0 {
unit 0 {
description to-OSPF-network;
family inet {
address 10.0.0.45/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 172.16.9.7/32;
}
family iso {
address 49.0002.0172.0016.0907.00;
}
}
}
user@R2# show protocols
isis {
export [ ospf-isis send-direct-to-isis-neighbors ];
interface fe-1/2/1.0;
interface lo0.0;
}

Copyright 2015, Juniper Networks, Inc.

87

IS-IS Feature Guide for Routing Devices

ospf {
export send-direct-to-ospf-neighbors;
area 0.0.0.1 {
interface fe-1/2/0.0;
interface lo0.0 {
passive;
}
}
}
user@R2# show policy-options
policy-statement ospf-isis {
term 1 {
from {
protocol ospf;
route-filter 192.168.0.0/22 longer;
}
then accept;
}
}
policy-statement send-direct-to-isis-neighbors {
from {
protocol direct;
route-filter 10.0.0.44/30 exact;
}
then accept;
}
policy-statement send-direct-to-ospf-neighbors {
from {
protocol direct;
route-filter 10.0.0.36/30 exact;
}
then accept;
}

Device R3

user@R3# show interfaces


fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.46/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.1.1/32;
address 192.168.2.1/32;
address 192.168.3.1/32;
address 192.168.0.1/32;
}
}
}
user@R3# show protocols
ospf {

88

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

export ospf;
area 0.0.0.1 {
interface fe-1/2/0.0;
interface lo0.0 {
passive;
}
}
}
user@R3# show policy-options
policy-statement ospf {
term 1 {
from protocol static;
then accept;
}
}
user@R3# show routing-options
static {
route 192.168.0.0/24 discard;
route 192.168.1.0/24 discard;
route 192.168.3.0/24 discard;
route 192.168.2.0/24 discard;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying OSPF Route Advertisement on page 89

Verifying Route Redistribution on page 90

Verifying Connectivity on page 90

Verifying OSPF Route Advertisement


Purpose
Action

Make sure that the expected routes are advertised by OSPF.


From operational mode on Device R2, enter the show route protocol ospf command.
user@R2> show route protocol ospf

inet.0: 15 destinations, 15 routes (15 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
192.168.0.0/24
192.168.0.1/32
192.168.1.0/24
192.168.1.1/32
192.168.2.0/24

Copyright 2015, Juniper Networks, Inc.

*[OSPF/150] 03:54:21, metric 0, tag 0


> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/10] 03:54:21, metric 1
> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/150] 03:54:21, metric 0, tag 0
> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/10] 03:54:21, metric 1
> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/150] 03:54:21, metric 0, tag 0
> to 10.0.0.46 via fe-1/2/0.0

89

IS-IS Feature Guide for Routing Devices

192.168.2.1/32
192.168.3.0/24
192.168.3.1/32
224.0.0.5/32

*[OSPF/10] 03:54:21, metric 1


> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/150] 03:54:21, metric 0, tag 0
> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/10] 03:54:21, metric 1
> to 10.0.0.46 via fe-1/2/0.0
*[OSPF/10] 03:56:03, metric 1
MultiRecv

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Meaning

The 192.168/16 routes are advertised by OSPF.

Verifying Route Redistribution


Purpose
Action

Make sure that the expected routes are redistributed from OSPF into IS-IS.
From operational mode on Device R1, enter the show route protocol isis command.
user@R1> show route protocol isis

inet.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
10.0.0.44/30
172.16.9.7/32
192.168.0.0/24
192.168.0.1/32
192.168.1.0/24
192.168.1.1/32
192.168.2.0/24
192.168.2.1/32
192.168.3.0/24
192.168.3.1/32

*[IS-IS/160] 03:45:24, metric 20


> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/15] 03:49:46, metric 10
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 10
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 11,
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 10
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 11,
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 10
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 11,
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 10
> to 10.0.0.37 via fe-1/2/0.0
*[IS-IS/160] 03:49:46, metric 11,
> to 10.0.0.37 via fe-1/2/0.0

tag2 1

tag2 1

tag2 1

tag2 1

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Meaning

The 192.168/16 routes are redistributed into IS-IS.

Verifying Connectivity
Purpose
Action

Check that Device R1 can reach the destinations on Device R3.


From operational mode, enter the ping command.
user@R1> ping 192.168.1.1

90

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

PING 192.168.1.1 (192.168.1.1): 56 data bytes


64 bytes from 192.168.1.1: icmp_seq=0 ttl=63 time=2.089 ms
64 bytes from 192.168.1.1: icmp_seq=1 ttl=63 time=1.270 ms
64 bytes from 192.168.1.1: icmp_seq=2 ttl=63 time=2.135 ms

Meaning

Related
Documentation

These results confirm that Device R1 can reach the destinations in the OSPF network.

Understanding Routing Policies on page 43

Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1 Area
This example shows how to leak prefixes in an IS-IS network from a Level 2 area to a
Level 1 area.

Requirements on page 91

Overview on page 91

Configuration on page 92

Verification on page 96

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Every routing protocol passes routing information up or down the routing hierarchy. This
bidirectional flow of routing information is known as route leaking.
By default, IS-IS protocol leaks routing information from a Level 1 area to a Level 2 area.
However, to leak routing information from a Level 2 area to a Level 1 area, an export policy
must be explicitly configured.

Topology
In this example, Devices R3 and R4 are configured in a Level 2 area. Devices R5, R6, and
R7 are configured in a Level 1 area.
Figure 9 on page 92 shows the topology used in this example.

Copyright 2015, Juniper Networks, Inc.

91

IS-IS Feature Guide for Routing Devices

Figure 9: Route Leaking from a Level 2 Area to a Level 1 Area


192.168.0.6/32

192.168.0.3/32

R3

10.0.0.0/30
Level 1

.21

R6

.30
10.0.0.0/30
Level 2

.17

.33

.22
R5

.18

.26

.29
.38

.34

.25

.37

R4

R7

192.168.0.4/32
49.0001

192.168.0.7/32
49.0002

g040934

192.168.0.5/32

Configuration
Configuring Route Leaking from a Level 2 Area to a Level 1 Area

92

CLI Quick
Configuration

To quickly configure route leaking from a Level 2 area to a Level 1 area, copy the following
commands, paste them into a text file, remove any line breaks, change any details
necessary to match your network configuration, and then copy and paste the commands
into the CLI at the [edit] hierarchy level.

Device R3

set interfaces fe-1/2/0 unit 0 description to-R4


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R5
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0001.0192.0168.0003.00
set policy-options policy-statement leak-L2-to-L1 from route-filter 192.168.0.0/24 orlonger
set policy-options policy-statement leak-L2-to-L1 from protocol isis
set policy-options policy-statement leak-L2-to-L1 from level 2
set policy-options policy-statement leak-L2-to-L1 to protocol isis
set policy-options policy-statement leak-L2-to-L1 to level 1
set policy-options policy-statement leak-L2-to-L1 then accept
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0 level 1 disable
set protocols isis export leak-L2-to-L1

Device R4

set interfaces fe-1/2/0 unit 0 description to-R3


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R5
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.25/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set interfaces lo0 unit 0 family iso address 49.0001.0192.0168.0004.00


set policy-options policy-statement leak-L2-to-L1 from route-filter 192.168.0.0/24 orlonger
set policy-options policy-statement leak-L2-to-L1 from protocol isis
set policy-options policy-statement leak-L2-to-L1 from level 2
set policy-options policy-statement leak-L2-to-L1 to protocol isis
set policy-options policy-statement leak-L2-to-L1 to level 1
set policy-options policy-statement leak-L2-to-L1 then accept
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0 level 1 disable
set protocols isis export leak-L2-to-L1

Device R5

set interfaces fe-1/2/0 unit 0 description to-R3


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.22/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R4
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.26/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R6
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.29/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/3 unit 0 description to-R7
set interfaces fe-1/2/3 unit 0 family inet address 10.0.0.38/30
set interfaces fe-1/2/3 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.5/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 2 disable
set protocols isis interface fe-1/2/3.0 level 2 disable
set protocols isis interface lo0.0 level 1 disable

Device R6

set interfaces fe-1/2/0 unit 0 description to-R5


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.30/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R7
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.33/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.6/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0006.00
set protocols isis interface fe-1/2/0.0 level 2 disable
set protocols isis interface fe-1/2/1.0 level 2 disable
set protocols isis interface lo0.0 level 2 disable

Device R7

set interfaces fe-1/2/0 unit 0 description to-R6


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.34/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R5
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.37/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.7/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0007.00
set protocols isis interface fe-1/2/0.0 level 2 disable
set protocols isis interface fe-1/2/1.0 level 2 disable
set protocols isis interface lo0.0 level 2 disable

Copyright 2015, Juniper Networks, Inc.

93

IS-IS Feature Guide for Routing Devices

Configuring Route Leaking from a Level 2 Area to a Level 1 Area


Step-by-Step
Procedure

The following example requires that you navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure route leaking from a Level 2 area to a Level 1 area:
1.

Configure the network interfaces.


Enable IS-IS on the interfaces by including the ISO address family on each interface.
[edit interfaces]
user@R3# set fe-1/2/0 unit 0 description to-R4
user@R3# set fe-1/2/0 unit 0 family inet address 10.0.0.17/30
user@R3# set fe-1/2/0 unit 0 family iso
user@R3# set fe-1/2/1 unit 0 description to-R5
user@R3# set fe-1/2/1 unit 0 family inet address 10.0.0.21/30
user@R3# set fe-1/2/1 unit 0 family iso

Similarly, configure other routers.


2.

Configure two loopback interface addresses.


One address is for IPv4, and the other address is to enable the router to form
adjacencies with other routers in the area.
[edit interfaces lo0 unit 0]
user@R3# set family inet address 192.168.0.3/32
user@R3# set family iso address 49.0001.0192.0168.0003.00

3.

Specify the IS-IS level on a per-interface basis.


[edit protocols isis interface]
user@R3# set fe-1/2/0.0 level 1 disable
user@R3# set fe-1/2/1.0 level 1 disable
user@R3# set lo0.0 level 1 disable

4.

Configure a route leaking policy on the routers configured in the Level 2 area to leak
routes into the Level 1 area.
[edit policy-options policy-statement leak-L2-to-L1]
user@R3# set from route-filter 192.168.0.0/24 orlonger
user@R3# set from protocol isis
user@R3# set from level 2
user@R3# set to protocol isis
user@R3# set to level 1
user@R3# set then accept
[edit protocols isis]
user@R3# set export leak-L2-to-L1

Similarly, configure Device R4.

Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols isis, and show policy-options commands.

94

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

If the output does not display the intended configuration, repeat the instructions in this
example to correct the configuration.
user@R3# show interfaces
fe-1/2/0 {
unit 0 {
description to-R4;
family inet {
address 10.0.0.17/30;
}
family iso;
}
}
fe-1/2/1 {
unit 0 {
description to-R5;
family inet {
address 10.0.0.21/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.3/32;
}
family iso {
address 49.0001.0192.0168.0003.00;
}
}
}
user@R3# show protocols isis
export leak-L2-to-L1;
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface lo0.0 {
level 1 disable;
}

user@R3# show policy-options


policy-statement leak-L2-to-L1 {
from {
protocol isis;
level 2;
route-filter 192.168.0.0/24 orlonger;
}
to {
protocol isis;
level 1;
}
then accept;
}

Copyright 2015, Juniper Networks, Inc.

95

IS-IS Feature Guide for Routing Devices

Similarly, confirm the configuration on all other routers. If you are done configuring the
routers, enter commit from configuration mode.

Verification
Verifying Route Leaking from a Level 2 Area to a Level 1 Area
Purpose
Action

Verify that IS-IS leaks routes from a Level 2 area to a Level 1 area.
To verify that route leaking is taking place, use the following commands:

show isis adjacency (to verify that the IS-IS network is up and adjacencies have been
established)

show isis database detail (to verify the presence of leaked routes)

1.

From operational mode on Device R3, run the show isis adjacency command.
user@R3> show isis adjacency
Interface
System
fe-1/2/0.0
R4
fe-1/2/1.0
R5

L State
2 Up
2 Up

Hold (secs) SNPA


7
0:5:85:8f:94:bd
7
0:5:85:8f:94:bd

The output verifies that the interfaces on Device R3 are up and have established
adjacencies with the connecting interfaces on Routers R4 and R5. If you dont see the
interfaces being functional, see the Results on page 94 section for troubleshooting
your configuration.
2. From operational mode on Device R3, run the show isis database detail command.
user@R3> show isis database detail
IS-IS level 1 link-state database:
R3.00-00 Sequence: 0x19, Checksum: 0x3453, Lifetime: 1078 secs
IP prefix: 192.168.0.4/32
Metric:
10 Internal Down
IP prefix: 192.168.0.5/32
Metric:
10 Internal Down
IP prefix: 192.168.0.6/32
Metric:
20 Internal Down
IP prefix: 192.168.0.7/32
Metric:
20 Internal Down
IS-IS level 2 link-state database:
R3.00-00 Sequence: 0x1c, Checksum: 0xc657, Lifetime: 1078 secs
IS neighbor: R4.02
Metric:
10
IS neighbor: R5.02
Metric:
10
IP prefix: 10.0.0.16/30
Metric:
10 Internal Up
IP prefix: 10.0.0.20/30
Metric:
10 Internal Up
IP prefix: 192.168.0.3/32
Metric:
0 Internal Up
R4.00-00 Sequence: 0x19, Checksum: 0xea13, Lifetime: 1076 secs
IS neighbor: R4.02
Metric:
10
IS neighbor: R5.03
Metric:
10
IP prefix: 10.0.0.16/30
Metric:
10 Internal Up
IP prefix: 10.0.0.24/30
Metric:
10 Internal Up
IP prefix: 192.168.0.4/32
Metric:
0 Internal Up
R4.02-00 Sequence: 0x17, Checksum: 0xecab, Lifetime: 1076 secs
IS neighbor: R3.00
Metric:
0
IS neighbor: R4.00
Metric:
0

96

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

R5.00-00 Sequence: 0x12, Checksum: 0xf4e5, Lifetime: 1076 secs


IS neighbor: R5.02
Metric:
10
IS neighbor: R5.03
Metric:
10
IP prefix: 10.0.0.20/30
Metric:
10
IP prefix: 10.0.0.24/30
Metric:
10
IP prefix: 10.0.0.28/30
Metric:
10
IP prefix: 10.0.0.32/30
Metric:
20
IP prefix: 10.0.0.36/30
Metric:
10
IP prefix: 192.168.0.5/32
Metric:
0
IP prefix: 192.168.0.6/32
Metric:
10
IP prefix: 192.168.0.7/32
Metric:
10

Internal
Internal
Internal
Internal
Internal
Internal
Internal
Internal

Up
Up
Up
Up
Up
Up
Up
Up

R5.02-00 Sequence: 0xb, Checksum: 0x2d74, Lifetime: 1076 secs


IS neighbor: R3.00
Metric:
0
IS neighbor: R5.00
Metric:
0
R5.03-00 Sequence: 0xb, Checksum: 0x6c32, Lifetime: 1076 secs
IS neighbor: R4.00
Metric:
0
IS neighbor: R5.00
Metric:
0

The Down keyword identifies the routes that have successfully leaked from the Level
2 area to the Level 1 area.
Meaning

Route leaking from a Level 2 to a Level 1 area is functioning as expected.

Understanding BGP Communities and Extended Communities as Routing Policy Match


Conditions
A BGP community is a group of destinations that share a common property. Community
information is included as a path attribute in BGP update messages. This information
identifies community members and enables you to perform actions on a group without
having to elaborate upon each member. You can use community and extended
communities attributes to trigger routing decisions, such as acceptance, rejection,
preference, or redistribution.
You can assign community tags to non-BGP routes through configuration (for static,
aggregate, or generated routes) or an import routing policy. These tags can then be
matched when BGP exports the routes.
A community value is a 32-bit field that is divided into two main sections. The first 16 bits
of the value encode the AS number of the network that originated the community, while
the last 16 bits carry a unique number assigned by the AS. This system attempts to
guarantee a globally unique set of community values for each AS in the Internet. Junos
OS uses a notation of as-number:community-value, where each value is a decimal number.
The AS values of 0 and 65,535 are reserved, as are all of the community values within
those AS numbers. Each community, or set of communities, is given a name within the
[edit policy-options] configuration hierarchy. The name of the community uniquely
identifies it to the routing device and serves as the method by which routes are categorized.
For example, a route with a community value of 64510:1111 might belong to the community
named AS64510-routes. The community name is also used within a routing policy as a
match criterion or as an action. The command syntax for creating a community is:
policy-options community name members [community-ids]. The community-ids are either

Copyright 2015, Juniper Networks, Inc.

97

IS-IS Feature Guide for Routing Devices

a single community value or multiple community values. When more than one value is
assigned to a community name, the routing device interprets this as a logical AND of the
community values. In other words, a route must have all of the configured values before
being assigned the community name.
The regular community attribute is four octets. Networking enhancements, such as VPNs,
have functionality requirements that can be satisfied by an attribute such as a community.
However, the 4-octet community value does not provide enough expansion and flexibility
to accommodate VPN requirements. This leads to the creation of extended communities.
An extended community is an 8-octet value that is also divided into two main sections.
The first 2 octets of the community encode a type field while the last 6 octets carry a
unique set of data in a format defined by the type field. Extended communities provide
a larger range for grouping or categorizing communities.
The BGP extended communities attribute format has three fields:
type:administrator:assigned-number. The routing device expects you to use the words
target or origin to represent the type field. The administrator field uses a decimal number
for the AS or an IPv4 address, while the assigned number field expects a decimal number
no larger than the size of the field (65,535 for 2 octets or 4,294,967,295 for 4 octets).
When specifying community IDs for standard and extended community attributes, you
can use UNIX-style regular expressions. The only exception is for VPN import policies
(vrf-import), which do not support regular expressions for the extended communities
attribute.
Related
Documentation

Understanding How to Define BGP Communities and Extended Communities

How BGP Communities and Extended Communities Are Evaluated in Routing Policy
Match Conditions

Example: Configuring a Routing Policy That Removes BGP Communities

Example: Configuring Communities in a Routing Policy

Example: Configuring Extended Communities in a Routing Policy

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS on page 98

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS
This example defines a policy that takes BGP routes from the Edu community and places
them into IS-IS with a metric of 63.

98

Requirements on page 99

Overview on page 99

Configuration on page 99

Verification on page 106

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Figure 10 on page 99 shows the topology used in this example.

Figure 10: Redistributing BGP Routes with a Specific Community Tag into
IS-IS

AS 1
IS-IS

10.0.0.4/30
fe-1/2/0

D
.5
IBGP

.14

.6

.13
.9

AS 2

10.0.0.12/30
10.0.0.8/30

fe-1/2/1

.10

.25

10.0.0.24/30

.26

C
fe-1/2/1

IBGP

fe-1/2/0

fe-1/2/2

EBGP
10.2/16
10.3/16

g041311

In this example, Device A, Device B, Device C, and Device D are in autonomous system
(AS) 1 and are running IS-IS. All of the AS 1 devices, except Device D, are running internal
BGP (IBGP).
Device E is in AS 2 and has an external BGP (EBGP) peering session with Device C. Device
E has two static routes, 10.2.0.0/16 and 10.3.0.0/16. These routes are tagged with the
Edu 2:5 community attribute and are advertised by way of EBGP to Device C.
Device C accepts the BGP routes that are tagged with the Edu 2:5 community attribute,
redistributes the routes into IS-IS, and applies an IS-IS metric of 63 to these routes.
CLI Quick Configuration on page 99 shows the configuration for all of the devices in
Figure 10 on page 99. The section Step-by-Step Procedure on page 101 describes the
steps on Device C and Device E.

Configuration
CLI Quick
Configuration

Device A

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.1

Copyright 2015, Juniper Networks, Inc.

99

IS-IS Feature Guide for Routing Devices

set protocols bgp group int neighbor 192.168.0.2


set protocols bgp group int neighbor 192.168.0.3
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.1
set routing-options autonomous-system 1

100

Device B

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.6/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.9/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.2
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.3
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.2
set routing-options autonomous-system 1

Device C

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.10/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.25/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.3
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.2
set protocols bgp group external-peers type external
set protocols bgp group external-peers export send-isis-and-direct
set protocols bgp group external-peers peer-as 2
set protocols bgp group external-peers neighbor 10.0.0.26
set protocols isis export Edu-to-isis
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 2 passive
set protocols isis interface lo0.0
set policy-options policy-statement Edu-to-isis term 1 from protocol bgp
set policy-options policy-statement Edu-to-isis term 1 from community Edu
set policy-options policy-statement Edu-to-isis term 1 then metric 63
set policy-options policy-statement Edu-to-isis term 1 then accept
set policy-options policy-statement send-isis-and-direct term 1 from protocol isis
set policy-options policy-statement send-isis-and-direct term 1 from protocol direct
set policy-options policy-statement send-isis-and-direct term 1 from route-filter
10.0.0.0/16 orlonger
set policy-options policy-statement send-isis-and-direct term 1 from route-filter
192.168.0.0/16 orlonger

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

set policy-options policy-statement send-isis-and-direct term 1 then accept


set policy-options community Edu members 2:5
set routing-options router-id 192.168.0.3
set routing-options autonomous-system 1

Device D

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.14/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0004.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.4
set routing-options autonomous-system 1

Device E

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.26/30


set interfaces lo0 unit 7 family inet address 192.168.0.5/32 primary
set interfaces lo0 unit 7 family inet address 10.2.0.1/32
set interfaces lo0 unit 7 family inet address 10.3.0.1/32
set protocols bgp group external-peers type external
set protocols bgp group external-peers export statics
set protocols bgp group external-peers peer-as 1
set protocols bgp group external-peers neighbor 10.0.0.25
set policy-options policy-statement statics from protocol static
set policy-options policy-statement statics then community add Edu
set policy-options policy-statement statics then accept
set policy-options community Edu members 2:5
set routing-options static route 10.2.0.0/16 reject
set routing-options static route 10.2.0.0/16 install
set routing-options static route 10.3.0.0/16 reject
set routing-options static route 10.3.0.0/16 install
set routing-options router-id 192.168.0.5
set routing-options autonomous-system 2

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device E:
1.

Configure the interfaces.


[edit interfaces]
user@E# set fe-1/2/0 unit 0 family inet address 10.0.0.26/30
user@E# set lo0 unit 7 family inet address 192.168.0.5/32 primary
user@E# set lo0 unit 7 family inet address 10.2.0.1/32
user@E# set lo0 unit 7 family inet address 10.3.0.1/32

2.

Configure the statics policy, which adds the Edu community attribute to the static
routes.
[edit policy-options]
user@E# set policy-statement statics from protocol static
user@E# set policy-statement statics then community add Edu
user@E# set policy-statement statics then accept
user@E# set community Edu members 2:5

Copyright 2015, Juniper Networks, Inc.

101

IS-IS Feature Guide for Routing Devices

3.

Configure EBGP and apply the statics policy.


[edit protocols bgp group external-peers]
user@E# set type external
user@E# set export statics
user@E# set peer-as 1
user@E# set protocols bgp group external-peers neighbor 10.0.0.25

4.

Configure the static routes.


[edit routing-options static]
user@E# set route 10.2.0.0/16 reject
user@E# set route 10.2.0.0/16 install
user@E# set route 10.3.0.0/16 reject
user@E# set route 10.3.0.0/16 install

5.

Configure the router ID and the AS number.


[edit routing-options]
user@E# set router-id 192.168.0.5
user@E# set autonomous-system 2

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device C:
1.

Configure the interfaces.


[edit interfaces]
user@C# set fe-1/2/0 unit 0 family inet address 10.0.0.10/30
user@C# set fe-1/2/0 unit 0 family iso
user@C# set fe-1/2/1 unit 0 family inet address 10.0.0.13/30
user@C# set fe-1/2/1 unit 0 family iso
user@C# set fe-1/2/2 unit 0 family inet address 10.0.0.25/30
user@C# set fe-1/2/2 unit 0 family iso
user@C# set lo0 unit 0 family inet address 192.168.0.3/32
user@C# set lo0 unit 0 family iso address 49.0002.0192.0168.0003.00

2.

Configure IBGP.
[edit protocols bgp group int]
user@C# set type internal
user@C# set local-address 192.168.0.3
user@C# set neighbor 192.168.0.1
user@C# set neighbor 192.168.0.2

3.

Configure the Edu-to-isis policy, which redistributes the Edu-tagged BGP routes
learned from Device E and applies a metric of 63.
[edit policy-options]
user@C# set policy-statement Edu-to-isis term 1 from protocol bgp
user@C# set policy-statement Edu-to-isis term 1 from community Edu
user@C# set policy-statement Edu-to-isis term 1 then metric 63
user@C# set policy-statement Edu-to-isis term 1 then accept
user@C# set community Edu members 2:5

4.

102

Enable IS-IS on the interfaces, and apply the Edu-to-isis policy.

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

[edit protocols isis]


user@C# set export Edu-to-isis
user@C# set interface fe-1/2/0.0 level 1 disable
user@C# set interface fe-1/2/1.0 level 1 disable
user@C# set interface fe-1/2/2.0 level 1 disable
user@C# set interface fe-1/2/2.0 level 2 passive
user@C# set interface lo0.0
5.

Configure the send-isis-and-direct policy, which redistributes routes to Device E,


through EBGP.
Without this policy, Device E would not have connectivity to the networks in AS 1.
[edit policy-options policy-statement send-isis-and-direct term 1]
user@C# set from protocol isis
user@C# set from protocol direct
user@C# set from route-filter 10.0.0.0/16 orlonger
user@C# set from route-filter 192.168.0.0/16 orlonger
user@C# set then accept

6.

Configure EBGP and apply the send-isis-and-direct policy.


[edit protocols bgp group external-peers]
user@C# set type external
user@C# set export send-isis-and-direct
user@C# set peer-as 2
user@C# set neighbor 10.0.0.26

7.

Configure the router ID and the autonomous system (AS) number.


[edit routing-options]
user@C# set router-id 192.168.0.3
user@C# set autonomous-system 1

Results

Device E

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
user@E# show interfaces
fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.26/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.5/32 {
primary;
}
address 10.2.0.1/32;
address 10.3.0.1/32;
}
}
}

Copyright 2015, Juniper Networks, Inc.

103

IS-IS Feature Guide for Routing Devices

user@E# show protocols


bgp {
group external-peers {
type external;
export statics;
peer-as 1;
neighbor 10.0.0.25;
}
}
user@E# show policy-options
policy-statement statics {
from protocol static;
then {
community add Edu;
accept;
}
}
community Edu members 2:5;
user@E# show routing-options
static {
route 10.2.0.0/16 {
reject;
install;
}
route 10.3.0.0/16 {
reject;
install;
}
}
router-id 192.168.0.5;
autonomous-system 2;

Device C

104

user@C# show interfaces


fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.10/30;
}
family iso;
}
}
fe-1/2/1 {
unit 0 {
family inet {
address 10.0.0.13/30;
}
family iso;
}
}
fe-1/2/2 {
unit 0 {
family inet {
address 10.0.0.25/30;
}
family iso;

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.3/32;
}
family iso {
address 49.0002.0192.0168.0003.00;
}
}
}
user@C# show protocols
bgp {
group int {
type internal;
local-address 192.168.0.3;
neighbor 192.168.0.1;
neighbor 192.168.0.2;
}
group external-peers {
type external;
export send-isis-and-direct;
peer-as 2;
neighbor 10.0.0.26;
}
}
isis {
export Edu-to-isis;
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface fe-1/2/2.0 {
level 1 disable;
level 2 passive;
}
interface lo0.0;
}
user@C# show policy-options
policy-statement Edu-to-isis {
term 1 {
from {
protocol bgp;
community Edu;
}
then {
metric 63;
accept;
}
}
}

Copyright 2015, Juniper Networks, Inc.

105

IS-IS Feature Guide for Routing Devices

policy-statement send-isis-and-direct {
term 1 {
from {
protocol [ isis direct ];
route-filter 10.0.0.0/16 orlonger;
route-filter 192.168.0.0/16 orlonger;
}
then accept;
}
}
community Edu members 2:5;
user@C# show routing-options
router-id 192.168.0.3;
autonomous-system 1;

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying the IS-IS Neighbor


Purpose

Action

Verify that the BGP routes from Device E are communicated on the IS-IS network in AS
1.
From operational mode, enter the show route protocol isis command.
user@D> show route protocol isis
inet.0: 11 destinations, 11 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.4/30
10.0.0.8/30
10.0.0.24/30
10.2.0.0/16
10.3.0.0/16
192.168.0.1/32
192.168.0.2/32
192.168.0.3/32

*[IS-IS/18] 22:30:53, metric 30


> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/18] 22:30:53, metric 20
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/18] 03:31:21, metric 20
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/165] 02:36:31, metric 73
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/165] 02:36:31, metric 73
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/18] 03:40:28, metric 30
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/18] 22:30:53, metric 20
> to 10.0.0.13 via fe-1/2/0.0
*[IS-IS/18] 22:30:53, metric 10
> to 10.0.0.13 via fe-1/2/0.0

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Meaning

106

As expected, the 10.2.0.0/16 and 10.3.0.0/16 routes are in Device Ds routing table as
IS-IS external routes with a metric of 73. If Device C had not added 63 to the metric,
Device D would have a metric of 10 for these routes.

Copyright 2015, Juniper Networks, Inc.

Chapter 4: Configuring IS-IS Routing Policy and Route Redistribution

Related
Documentation

Advertising LSPs into IGPs

IS-IS Extensions to Support Route Tagging


To control the transmission of routes into IS-IS, or to control transmission of IS-IS routes
between different IS-IS levels, you can tag routes with certain attributes. IS-IS routes
can carry these attributes, which the routing policies can use to export and import routes
between different IS-IS levels. A sub-TLV to the IP prefix TLV is used to carry the tag or
attribute on the routes.

NOTE: Route tagging does not work when IS-IS traffic engineering is disabled.

protocols {
isis {
export tag-lo0;
}
}
policy-options {
policy-statement tag-lo0 {
from {
interface lo0.0;
}
then {
accept;
tag 200;
}
}
}

You can verify that the tag has been correctly applied by using the show isis database
extensive command. In the command output, look for the Administrative tag field.
After verifying that the routes are tagged correctly, you can apply a route leaking policy
to match against the presence of administrative tags, rather than specifying a list of route
filters.
protocols {
isis {
export leak-tagged-L2-to-L1;
}
}
policy-options {
policy-statement leak-tagged-L2-to-L1 {
from {
tag 200;
protocol isis;
level 2;
}
to {
protocol isis;
level 1;

Copyright 2015, Juniper Networks, Inc.

107

IS-IS Feature Guide for Routing Devices

}
then accept;
}
}

Related
Documentation

108

Example: Configuring IS-IS Route Leaking from a Level 2 Area to a Level 1 Area on
page 91

Copyright 2015, Juniper Networks, Inc.

CHAPTER 5

Configuring IS-IS Bidirectional Forwarding


Detection

Understanding BFD for IS-IS on page 109

Example: Configuring BFD for IS-IS on page 111

Understanding BFD Authentication for IS-IS on page 117

Configuring BFD Authentication for IS-IS on page 119

Example: Configuring BFD Authentication for IS-IS on page 122

Understanding BFD for IS-IS


The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. Hello packets are sent at a specified, regular interval. A
neighbor failure is detected when the routing device stops receiving a reply after a specified
interval. BFD works with a wide variety of network environments and topologies. The
failure detection timers for BFD have shorter time limits than the failure detection
mechanisms of IS-IS, providing faster detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
For example, the timers can adapt to a higher value if the adjacency fails, or a neighbor
can negotiate a higher value for a timer than the configured value. The timers adapt to
a higher value when a BFD session flap occurs more than three times in a span of 15
seconds. A back-off algorithm increases the receive (RX) interval by two if the local BFD
instance is the reason for the session flap. The transmission (TX) interval is increased by
two if the remote BFD instance is the reason for the session flap.
You can use the clear bfd adaptation command to return BFD interval timers to their
configured values. The clear bfd adaptation command is hitless, meaning that the
command does not affect traffic flow on the routing device.

NOTE: BFD for IS-IS on an IPv6-only interface is supported. If the interface


is dual-stacked (both IPv4 and IPv6 are configured), then you can configure
BFD as a client on the IPv4 IS-IS session.

To detect failures in the network, the set of statements in Table 3 on page 110 are used
in the configuration.

Copyright 2015, Juniper Networks, Inc.

109

IS-IS Feature Guide for Routing Devices

Table 3: Configuring BFD for IS-IS


Statement

Description

bfd-liveness-detection

Enable failure detection.

minimum-interval
milliseconds

Specify the minimum transmit and receive intervals for failure detection.
This value represents the minimum interval at which the local router transmits hellos packets as
well as the minimum interval at which the router expects to receive a reply from a neighbor with
which it has established a BFD session. You can configure a number from 1 through
255,000 milliseconds. You can also specify the minimum transmit and receive intervals separately.
NOTE: BFD is an intensive protocol that consumes system resources. Specifying a minimum interval
for BFD less than 100 ms for Routing Engine-based sessions and 10 ms for distributed BFD sessions
can cause undesired BFD flapping.
Depending on your network environment, these additional recommendations might apply:

minimum-receive-interval
milliseconds

For large-scale network deployments with a large number of BFD sessions, specify a minimum
interval of 300 ms for Routing Engine-based sessions and 100 ms for distributed BFD sessions.

For very large-scale network deployments with a large number of BFD sessions, please contact
Juniper Networks customer support for more information.

For BFD sessions to remain up during a Routing Engine switchover event when nonstop active
routing (NSR) is configured, specify a minimum interval of 2500 ms for Routing Engine-based
sessions. For distributed BFD sessions with nonstop active routing configured, the minimum
interval recommendations are unchanged and depend only on your network deployment.

Specify only the minimum receive interval for failure detection.


This value represents the minimum interval at which the local router expects to receive a reply
from a neighbor with which it has established a BFD session. You can configure a number from 1
through 255,000 milliseconds.

multiplier number

Specify the number of hello packets not received by the neighbor that causes the originating
interface to be declared down.
The default is 3, and you can configure a value from 1 through 225.

no-adaptation

Disable BFD adaptation.


In Junos OS Release 9.0 and later, you can specify that the BFD sessions not adapt to changing
network conditions.
NOTE: We recommend that you not disable BFD adaptation unless it is preferable not to have
BFD adaptation enabled in your network.

threshold

Specify the threshold for the following:

Adaptation of the detection time


When the BFD session detection time adapts to a value equal to or greater than the threshold,
a single trap and a system log message are sent.

Transmit interval

NOTE: The threshold value must be greater than the minimum transmit interval multiplied by the
multiplier number.

110

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

Table 3: Configuring BFD for IS-IS (continued)


Statement

Description

transmit-interval
minimum-interval

Specify the minimum transmit interval for failure detection.


This value represents the minimum interval at which the local routing device transmits hello packets
to the neighbor with which it has established a BFD session. You can configure a value from 1
through 255,000 milliseconds.

version

Specify the BFD version used for detection.


The default is to have the version detected automatically.

NOTE: You can trace BFD operations by including the traceoptions statement
at the [edit protocols bfd] hierarchy level.

For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
Related
Documentation

Example: Configuring BFD for IS-IS on page 111

Understanding BFD Authentication for IS-IS on page 117

Example: Configuring BFD for IS-IS


This example describes how to configure the Bidirectional Forwarding Detection (BFD)
protocol to detect failures in an IS-IS network.

NOTE: BFD is not supported with ISIS for IPV6 on QFX10000 series switches.

Requirements on page 111

Overview on page 112

Configuration on page 112

Verification on page 115

Requirements
Before you begin, configure IS-IS on both routers. See Example: Configuring IS-IS on
page 14 for information about the required IS-IS configuration.
This example uses the following hardware and software components:

Junos OS Release 7.3 or later

M Series, MX Series, and T Series routers

Copyright 2015, Juniper Networks, Inc.

111

IS-IS Feature Guide for Routing Devices

Overview
This example shows two routers connected to each other. A loopback interface is
configured on each router. IS-IS and BFD protocols are configured on both routers.
Figure 11 on page 112 shows the sample network.

Figure 11: Configuring BFD for IS-IS

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Router R1
set protocols isis interface so-0/0/0 bfd-liveness-detection detection-time threshold 5
set protocols isis interface so-0/0/0 bfd-liveness-detection minimum-interval 2
set protocols isis interface so-0/0/0 bfd-liveness-detection minimum-receive-interval 1
set protocols isis interface so-0/0/0 bfd-liveness-detection no-adaptation
set protocols isis interface so-0/0/0 bfd-liveness-detection transmit-interval threshold 3
set protocols isis interface so-0/0/0 bfd-liveness-detection transmit-interval
minimum-interval 1
set protocols isis interface so-0/0/0 bfd-liveness-detection multiplier 2
set protocols isis interface so-0/0/0 bfd-liveness-detection version automatic

Router R2
set protocols isis interface so-0/0/0 bfd-liveness-detection detection-time threshold 6
set protocols isis interface so-0/0/0 bfd-liveness-detection minimum-interval 3
set protocols isis interface so-0/0/0 bfd-liveness-detection minimum-receive-interval 1
set protocols isis interface so-0/0/0 bfd-liveness-detection no-adaptation
set protocols isis interface so-0/0/0 bfd-liveness-detection transmit-interval threshold 4
set protocols isis interface so-0/0/0 bfd-liveness-detection transmit-interval
minimum-interval 1
set protocols isis interface so-0/0/0 bfd-liveness-detection multiplier 2
set protocols isis interface so-0/0/0 bfd-liveness-detection version automatic

112

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.

NOTE: To simply configure BFD for IS-IS, only the minimum-interval statement
is required. The BFD protocol selects default parameters for all the other
configuration statements when you use the bfd-liveness-detection statement
without specifying any parameters.

NOTE: You can change parameters at any time without stopping or restarting
the existing session. BFD automatically adjusts to the new parameter value.
However, no changes to BFD parameters take place until the values
resynchronize with each BFD peer.

To configure BFD for IS-IS on Routers R1 and R2:


1.

Enable BFD failure detection for IS-IS.


[edit protocols isis]
user@R1# set interface so-0/0/0 bfd-liveness-detection
[edit protocols isis]
user@R2# set interface so-0/0/0 bfd-liveness-detection

2.

Configure the threshold for the adaptation of the detection time, which must be
greater than the multiplier number multiplied by the minimum interval.
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set detection-time threshold 5
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set detection-time threshold 6

3.

Configure the minimum transmit and receive intervals for failure detection.
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set minimum-interval 2
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set minimum-interval 3

4.

Configure only the minimum receive interval for failure detection.


[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set minimum-receive-interval 1
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set minimum-receive-interval 1

5.

Disable BFD adaptation.


[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set no-adaptation

Copyright 2015, Juniper Networks, Inc.

113

IS-IS Feature Guide for Routing Devices

[edit protocols isis interface so-0/0/0 bfd-liveness-detection]


user@R2# set no-adaptation
6.

Configure the threshold for the transmit interval, which must be greater than the
minimum transmit interval.
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set transmit-interval threshold 3
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set transmit-interval threshold 4

7.

Configure the minimum transmit interval for failure detection.


[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set transmit-interval minimum-interval 1
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set transmit-interval minimum-interval 1

8.

Configure the multiplier number, which is the number of hello packets not received
by the neighbor that causes the originating interface to be declared down.
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set multiplier 2
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set multiplier 2

9.

Configure the BFD version used for detection.


The default is to have the version detected automatically.
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R1# set version automatic
[edit protocols isis interface so-0/0/0 bfd-liveness-detection]
user@R2# set version automatic

Results
From configuration mode, confirm your configuration by issuing the show protocols isis
interface command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@R1# show protocols isis interface so-0/0/0
bfd-liveness-detection {
version automatic;
minimum-interval 2;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 3;
}
detection-time {
threshold 5;
}
}
...

114

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

user@R2# show protocols isis interface so-0/0/0


bfd-liveness-detection {
version automatic;
minimum-interval 3;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 4;
}
detection-time {
threshold 6;
}
}
...

Verification
Confirm that the configuration is working properly.

Verifying the Connection Between Routers R1 and R2 on page 115

Verifying That IS-IS Is Configured on page 116

Verifying That BFD Is configured on page 116

Verifying the Connection Between Routers R1 and R2


Purpose
Action

Make sure that Routers R1 and R2 are connected to each other.


Ping the other router to check the connectivity between the two routers as per the network
topology.
user@R1> ping 10.0.0.2
PING 10.0.0.2 (10.0.0.2): 56 data bytes
64 bytes from 10.0.0.2: icmp_seq=0 ttl=64 time=1.367 ms
64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=1.662 ms
64 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=1.291 ms
^C
--- 10.0.0.2 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.291/1.440/1.662/0.160 ms
user@R2> ping 10.0.0.1
PING 10.0.0.1 (10.0.0.1): 56 data bytes
64 bytes from 10.0.0.1: icmp_seq=0 ttl=64 time=1.287 ms
64 bytes from 10.0.0.1: icmp_seq=1 ttl=64 time=1.310 ms
64 bytes from 10.0.0.1: icmp_seq=2 ttl=64 time=1.289 ms
^C
--- 10.0.0.1 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.287/1.295/1.310/0.010 ms

Meaning

Routers R1 and R2 are connected to each other.

Copyright 2015, Juniper Networks, Inc.

115

IS-IS Feature Guide for Routing Devices

Verifying That IS-IS Is Configured


Purpose
Action

Make sure that the IS-IS instance is running on both routers.


Use the show isis database statement to check if the IS-IS instance is running on both
routers, R1 and R2.
user@R1> show isis database
IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
R1.00-00
0x4a571
0x30c5
1195 L1 L2
R2.00-00
0x4a586
0x4b7e
1195 L1 L2
R2.02-00
0x330ca1 0x3492
1196 L1 L2
3 LSPs
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
R1.00-00
0x4a856
0x5db0
1194 L1 L2
R2.00-00
0x4a89d
0x149b
1194 L1 L2
R2.02-00
0x1fb2ff 0xd302
1194 L1 L2
3 LSPs
user@R2> show isis database
IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
R1.00-00
0x4b707
0xcc80
1195 L1 L2
R2.00-00
0x4b71b
0xeb37
1198 L1 L2
R2.02-00
0x33c2ce 0xb52d
1198 L1 L2
3 LSPs
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
R1.00-00
0x4b9f2
0xee70
1192 L1 L2
R2.00-00
0x4ba41
0x9862
1197 L1 L2
R2.02-00
0x3
0x6242
1198 L1 L2
3 LSPs

Meaning

IS-IS is configured on both routers, R1 and R2.

Verifying That BFD Is configured


Purpose
Action

Make sure that the BFD instance is running on both routers, R1 and R2.
Use the show bfd session detail statement to check if BFD instance is running on the
routers.
user@R1> show bfd session detail
Detect
Address
State
Interface
Time
10.0.0.2
Up
so-0/0/0
2.000
Client ISIS R2, TX interval 0.001, RX interval 0.001
Client ISIS R1, TX interval 0.001, RX interval 0.001
Session down time 00:00:00, previous up time 00:00:15
Local diagnostic NbrSignal, remote diagnostic NbrSignal
Remote state AdminDown, version 1

116

Transmit
Interval
1.000

Multiplier
2

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

Router 3, routing table index 17


1 sessions, 2 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
user@R2> show bfd session detail
Detect
Address
State
Interface
Time
10.0.0.1
Up
so-0/0/0
2.000
Client ISIS R2, TX interval 0.001, RX interval 0.001
Session down time 00:00:00, previous up time 00:00:05
Local diagnostic NbrSignal, remote diagnostic NbrSignal
Remote state AdminDown, version 1
Router 2, routing table index 15

Transmit
Interval
1.000

Multiplier
2

1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps

Meaning

Related
Documentation

BFD is configured on Routers R1 and R2 for detecting failures in the IS-IS network.

Understanding BFD for IS-IS on page 109

Understanding BFD Authentication for IS-IS


Bidirectional Forwarding Detection (BFD) enables rapid detection of communication
failures between adjacent systems. By default, authentication for BFD sessions is disabled.
However, when running BFD over Network Layer protocols, the risk of service attacks can
be significant. We strongly recommend using authentication if you are running BFD over
multiple hops or through insecure tunnels. Beginning with Junos OS Release 9.6, Junos
OS supports authentication for BFD sessions running over IS-IS. BFD authentication is
only supported in the domestic image and is not available in the export image.
You authenticate BFD sessions by specifying an authentication algorithm and keychain,
and then associating that configuration information with a security authentication
keychain using the keychain name.
The following sections describe the supported authentication algorithms, security
keychains, and level of authentication that can be configured:

BFD Authentication Algorithms on page 118

Security Authentication Keychains on page 118

Strict Versus Loose Authentication on page 119

Copyright 2015, Juniper Networks, Inc.

117

IS-IS Feature Guide for Routing Devices

BFD Authentication Algorithms


Junos OS supports the following algorithms for BFD authentication:

simple-passwordPlain-text password. One to 16 bytes of plain text are used to

authenticate the BFD session. One or more passwords might be configured. This method
is the least secure and should be used only when BFD sessions are not subject to packet
interception.

keyed-md5Keyed Message Digest 5 hash algorithm for sessions with transmit and

receive intervals greater than 100 ms. To authenticate the BFD session, keyed MD5
uses one or more secret keys (generated by the algorithm) and a sequence number
that is updated periodically. With this method, packets are accepted at the receiving
end of the session if one of the keys matches and the sequence number is greater than
or equal to the last sequence number received. Although more secure than a simple
password, this method is vulnerable to replay attacks. Increasing the rate at which the
sequence number is updated can reduce this risk.

meticulous-keyed-md5Meticulous keyed Message Digest 5 hash algorithm. This

method works in the same manner as keyed MD5, but the sequence number is updated
with every packet. Although more secure than keyed MD5 and simple passwords, this
method might take additional time to authenticate the session.

keyed-sha-1Keyed Secure Hash Algorithm I for sessions with transmit and receive

intervals greater than 100 ms. To authenticate the BFD session, keyed SHA uses one
or more secret keys (generated by the algorithm) and a sequence number that is
updated periodically. The key is not carried within the packets. With this method,
packets are accepted at the receiving end of the session if one of the keys matches
and the sequence number is greater than the last sequence number received.

meticulous-keyed-sha-1Meticulous keyed Secure Hash Algorithm I. This method

works in the same manner as keyed SHA, but the sequence number is updated with
every packet. Although more secure than keyed SHA and simple passwords, this method
might take additional time to authenticate the session.

NOTE: Nonstop active routing (NSR) is not supported with


meticulous-keyed-md5 and meticulous-keyed-sha-1 authentication
algorithms. BFD sessions using these algorithms might go down after a
switchover.

Security Authentication Keychains


The security authentication keychain defines the authentication attributes used for
authentication key updates. When the security authentication keychain is configured and
associated with a protocol through the keychain name, authentication key updates can
occur without interrupting routing and signaling protocols.
The authentication keychain contains one or more keychains. Each keychain contains
one or more keys. Each key holds the secret data and the time at which the key becomes
valid. The algorithm and keychain must be configured on both ends of the BFD session,

118

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

and they must match. Any mismatch in configuration prevents the BFD session from
being created.
BFD allows multiple clients per session, and each client can have its own keychain and
algorithm defined. To avoid confusion, we recommend specifying only one security
authentication keychain.

Strict Versus Loose Authentication


By default, strict authentication is enabled and authentication is checked at both ends
of each BFD session. Optionally, to smooth migration from nonauthenticated sessions
to authenticated sessions, you can configure loose checking. When loose checking is
configured, packets are accepted without authentication being checked at each end of
the session. This feature is intended for transitional periods only.
Related
Documentation

Example: Configuring BFD Authentication for IS-IS on page 122

Configuring BFD Authentication for IS-IS


Beginning with Junos OS Release 9.6, you can configure authentication for BFD sessions
running over IS-IS. Routing instances are also supported. Only three steps are needed to
configure authentication on a BFD session:
1.

Specify the BFD authentication algorithm for the IS-IS protocol.

2. Associate the authentication keychain with the IS-IS protocol.


3. Configure the related security authentication keychain.

The following sections provide instructions for configuring and viewing BFD authentication
on IS-IS:

Configuring BFD Authentication Parameters on page 119

Viewing Authentication Information for BFD Sessions on page 120

Configuring BFD Authentication Parameters


To configure BFD authentication:
1.

Specify the algorithm (keyed-md5, keyed-sha-1, meticulous-keyed-md5,


meticulous-keyed-sha-1, or simple-password) to use for BFD authentication on an
IS-IS route or routing instance.
[edit]
user@host# set protocols isis interface if1-isis bfd-liveness-detection authentication
algorithm keyed-sha-1

NOTE: Nonstop active routing (NSR) is not supported with the


meticulous-keyed-md5 and meticulous-keyed-sha-1 authentication
algorithms. BFD sessions using these algorithms might go down after a
switchover.

Copyright 2015, Juniper Networks, Inc.

119

IS-IS Feature Guide for Routing Devices

2. Specify the keychain to be used to associate BFD sessions on the specified IS-IS route

or routing instance with the unique security authentication keychain attributes.


This should match the keychain name configured at the [edit security authentication
key-chains] hierarchy level.
[edit]
user@host# set protocols isis interface if1-isis bfd-liveness-detection authentication
keychain bfd-isis

NOTE: The algorithm and keychain must be configured on both ends of


the BFD session, and they must match. Any mismatch in configuration
prevents the BFD session from being created.

3. Specify the unique security authentication information for BFD sessions:

The matching keychain name as specified in Step 2.

At least one key, a unique integer between 0 and 63. Creating multiple keys allows
multiple clients to use the BFD session.

The secret data used to allow access to the session.

The time at which the authentication key becomes active, yyyy-mm-dd.hh:mm:ss.


[edit security]
user@host# set authentication-key-chains key-chain bfd-sr4 key 53 secret
$9$ggaJDmPQ6/tJgF/AtREVsyPsnCtUHm start-time 2009-06-14.10:00:00

4. (Optional) Specify loose authentication checking if you are transitioning from

nonauthenticated sessions to authenticated sessions.


[edit]
user@host> set protocols isis interface if1-isis bfd-liveness-detection authentication
loose-check
5. (Optional) View your configuration using the show bfd session detail or show bfd

session extensive command.


6. Repeat these steps to configure the other end of the BFD session.

NOTE: BFD authentication is only supported in the domestic image and is


not available in the export image.

Viewing Authentication Information for BFD Sessions


You can view the existing BFD authentication configuration using the show bfd session
detail and show bfd session extensive commands.
The following example shows BFD authentication configured for the if1-isis interface. It
specifies the keyed SHA-1 authentication algorithm and a keychain name of bfd-isis. The
authentication keychain is configured with two keys. Key 1 contains the secret data
$9$ggaJDmPQ6/tJgF/AtREVsyPsnCtUHm and a start time of June 1, 2009, at 9:46:02

120

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

AM PST. Key 2 contains the secret data $9$a5jiKW9l.reP38ny.TszF2/9 and a start time
of June 1, 2009, at 3:29:20 PM PST.
[edit protocols isis]
interface if1-isis {
bfd-liveness-detection {
authentication {
algorithm keyed-sha-1;
key-chain bfd-isis;
}
}
}
[edit security]
authentication key-chains {
key-chain bfd-isis {
key 1 {
secret $9$ggaJDmPQ6/tJgF/AtREVsyPsnCtUHm;
start-time 2009-6-1.09:46:02 -0700;
}
key 2 {
secret $9$a5jiKW9l.reP38ny.TszF2/9;
start-time 2009-6-1.15:29:20 -0700;
}
}
}

If you commit these updates to your configuration, you see output similar to the following.
In the output for the show bfd sessions detail command, Authenticate is displayed to
indicate that BFD authentication is configured. For more information about the
configuration, use the show bfd sessions extensive command. The output for this
command provides the keychain name, the authentication algorithm and mode for each
client in the session, and the overall BFD authentication configuration status, keychain
name, and authentication algorithm and mode.
show bfd sessions detail
user@host# show bfd session detail
Detect
Transmit
Address
State
Interface
Time
Interval Multiplier
10.9.1.29
Up
ge-4/0/0.0
0.600
0.200
3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3, Authenticate
Session up time 3d 00:34, previous down time 00:00:01
Local diagnostic NbrSignal, remote diagnostic AdminDown
Remote state Up, version 1
1 sessions, 1 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

show bfd sessions extensive


user@host# show bfd session extensive
Detect
Transmit
Address
State
Interface
Time
Interval Multiplier
10.9.1.29
Up
ge-4/0/0.0
0.600
0.200
3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3, Authenticate

Copyright 2015, Juniper Networks, Inc.

121

IS-IS Feature Guide for Routing Devices

keychain bfd-isis, algo keyed-sha-1, mode strict


Session up time 00:04:42
Local diagnostic None, remote diagnostic NbrSignal
Remote state Up, version 1
Replicated
Min async interval 0.300, min slow interval 1.000
Adaptive async TX interval 0.300, RX interval 0.300
Local min TX interval 0.300, minimum RX interval 0.300, multiplier 3
Remote min TX interval 0.300, min RX interval 0.300, multiplier 3
Local discriminator 2, remote discriminator 2
Echo mode disabled/inactive
Authentication enabled/active, keychain bfd-isis, algo keyed-sha-1, mode strict
1 sessions, 1 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

Related
Documentation

Understanding BFD Authentication for IS-IS on page 117

Example: Configuring BFD for IS-IS on page 111

Understanding BFD for IS-IS on page 109

Example: Configuring BFD Authentication for IS-IS


This example shows how to configure BFD authentication for IS-IS.

Requirements on page 122

Overview on page 122

Configuration on page 123

Verification on page 125

Requirements
Before you begin, configure IS-IS on both routers. See Example: Configuring IS-IS on
page 14 for information about the required IS-IS configuration.

Overview
In this example, a BFD authentication keychain is configured with meticulous keyed MD5
authentication.
Figure 12 on page 122 shows the topology used in this example.

Figure 12: IS-IS BFD Authentication Topology

122

10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

CLI Quick Configuration on page 123 shows the configuration for both of the devices in
Figure 12 on page 122. The section Step-by-Step Procedure on page 123 describes the
steps on Device R1.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

set security authentication-key-chains key-chain secret123 description for-isis-bfd


set security authentication-key-chains key-chain secret123 key 1 secret "$9$cW-yrv"
set security authentication-key-chains key-chain secret123 key 1 start-time
"2012-5-31.13:00:00 -0700"
set security authentication-key-chains key-chain secret123 key 2 secret "$9$m5T3"
set security authentication-key-chains key-chain secret123 key 2 start-time
"2013-5-31.13:00:00 -0700"
set security authentication-key-chains key-chain secret123 key 3 secret "$9$mTQn"
set security authentication-key-chains key-chain secret123 key 3 start-time
"2014-5-31.13:00:00 -0700"
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection minimum-interval 100
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection authentication key-chain
secret123
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection authentication algorithm
meticulous-keyed-md5

Device R2

set security authentication-key-chains key-chain secret123 description for-isis-bfd


set security authentication-key-chains key-chain secret123 key 1 secret "$9$cW-yrv"
set security authentication-key-chains key-chain secret123 key 1 start-time
"2012-5-31.13:00:00 -0700"
set security authentication-key-chains key-chain secret123 key 2 secret "$9$m5T3"
set security authentication-key-chains key-chain secret123 key 2 start-time
"2013-5-31.13:00:00 -0700"
set security authentication-key-chains key-chain secret123 key 3 secret "$9$mTQn"
set security authentication-key-chains key-chain secret123 key 3 start-time
"2014-5-31.13:00:00 -0700"
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection minimum-interval 100
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection authentication key-chain
secret123
set protocols isis interface ge-1/2/0.0 bfd-liveness-detection authentication algorithm
meticulous-keyed-md5

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS BFD authentication:
1.

Configure the authentication keychain.


[edit security authentication-key-chains key-chain secret123]
user@R1# set description for-isis-bfd
user@R1# set key 1 secret "$9$cW-yrv"
user@R1# set key 1 start-time "2012-5-31.13:00:00 -0700"

Copyright 2015, Juniper Networks, Inc.

123

IS-IS Feature Guide for Routing Devices

user@R1# set key 2 secret "$9$m5T3"


user@R1# set key 2 start-time "2013-5-31.13:00:00 -0700"
user@R1# set key 3 secret "$9$mTQn"
user@R1# set key 3 start-time "2014-5-31.13:00:00 -0700"
2.

Enable BFD.
[edit protocols isis interface ge-1/2/0.0 bfd-liveness-detection]
user@R1# set minimum-interval 100

3.

Apply the authentication keychain.


[edit protocols isis interface ge-1/2/0.0 bfd-liveness-detection]
user@R1# set authentication key-chain secret123

4.

Set the authentication type.


[edit protocols isis interface ge-1/2/0.0 bfd-liveness-detection]
user@R1# set authentication algorithm meticulous-keyed-md5

Results

From configuration mode, confirm your configuration by entering the show protocols and
show security commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show protocols
isis {
interface ge-1/2/0.0 {
bfd-liveness-detection {
minimum-interval 100;
authentication {
key-chain secret123;
algorithm meticulous-keyed-md5;
}
}
}
}
user@R1# show security
authentication-key-chains {
key-chain secret123 {
description for-isis-bfd;
key 1 {
secret "$9$cW-yrv"; ## SECRET-DATA
start-time "2012-5-31.13:00:00 -0700";
}
key 2 {
secret "$9$m5T3"; ## SECRET-DATA
start-time "2013-5-31.13:00:00 -0700";
}
key 3 {
secret "$9$mTQn"; ## SECRET-DATA
start-time "2014-5-31.13:00:00 -0700";
}
}
}

If you are done configuring the device, enter commit from configuration mode.

124

Copyright 2015, Juniper Networks, Inc.

Chapter 5: Configuring IS-IS Bidirectional Forwarding Detection

Verification
Confirm that the configuration is working properly.

Verifying IS-IS BFD Authentication


Purpose
Action

Verify the status of IS-IS BFD authentication.


From operational mode, enter the show bfd session extensive command.
user@R1> show bfd session extensive
Detect
Transmit
Address
State
Interface
Time
Interval Multiplier
10.0.0.2
Down
ge-1/2/0.0
0.300
1.000
3
Client ISIS L1, TX interval 0.100, RX interval 0.100, Authenticate
keychain secret123, algo meticulous-keyed-md5, mode strict
Client ISIS L2, TX interval 0.100, RX interval 0.100, Authenticate
keychain secret123, algo meticulous-keyed-md5, mode strict
Session down time 00:35:13, previous up time 00:12:17
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Logical system 2, routing table index 85
Min async interval 0.100, min slow interval 1.000
Adaptive async TX interval 0.100, RX interval 0.100
Local min TX interval 1.000, minimum RX interval 0.100, multiplier 3
Remote min TX interval 0.100, min RX interval 0.100, multiplier 3
Local discriminator 2, remote discriminator 1
Echo mode disabled/inactive, no-absorb, no-refresh
Authentication enabled/active, keychain secret123, algo meticulous-keyed-md5,
mode strict
Session ID: 0x100101
1 sessions, 2 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 10.0 pps

Meaning

Related
Documentation

The output shows that BFD authentication is enabled on IS-IS Level 1 and Level 2.

Configuring BFD Authentication for IS-IS on page 119

Example: Configuring BFD for IS-IS on page 111

Understanding BFD for IS-IS on page 109

Copyright 2015, Juniper Networks, Inc.

125

IS-IS Feature Guide for Routing Devices

126

Copyright 2015, Juniper Networks, Inc.

CHAPTER 6

Configuring IS-IS Multitopology Routing


and IPv6 Support

IS-IS Multicast Topologies Overview on page 127

Example: Configuring IS-IS Multicast Topology on page 128

Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses on page 142

Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses on page 144

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

IS-IS Multicast Topologies Overview


Most multicast routing protocols perform a reverse-path forwarding (RPF) check on the
source of multicast data packets. If a packet comes in on the interface that is used to
send data to the source, the packet is accepted and forwarded to one or more
downstream interfaces. Otherwise, the packet is discarded and a notification is sent to
the multicast routing protocol running on the interface.
In certain instances, the unicast routing table used for the RPF check is also the table
used for forwarding unicast data packets. Thus, unicast and multicast routing are
congruent. In other cases, where it is preferred that multicast routing be independent of
unicast routing, the multicast routing protocols are configured to perform the RPF check
using an alternate unicast routing table inet.2.
You can configure IS-IS to calculate an alternate IPv4 multicast topology, in addition to
the normal IPv4 unicast topology, and add the corresponding routes to inet.2. The IS-IS
interface metrics for the multicast topology can be configured independently of the
unicast metrics. You can also selectively disable interfaces from participating in the
multicast topology while continuing to participate in the regular unicast topology. This
enables you to exercise control over the paths that multicast data takes through a network
so that it is independent of unicast data paths. You can also configure IS-IS to calculate
an alternate IPv6 multicast topology, in addition to the normal IPv6 unicast topology.

NOTE: IS-IS only starts advertising the routes when the interface routes are
in inet.2.

Copyright 2015, Juniper Networks, Inc.

127

IS-IS Feature Guide for Routing Devices

Table 4 on page 128 lists the various IPv4 statements you can use to configure IS-IS
topologies.

Table 4: IPv4 Statements


Statement

Description

ipv4-multicast

Enables an alternate IPv4 multicast topology.

ipv4-multicast-metric number

Configures the multicast metric for an alternate IPv4 multicast topology.

no-ipv4-multicast

Excludes an interface from the IPv4 multicast topology.

no-unicast-topology

Excludes an interface from the IPv4 unicast topologies.

Table 5 on page 128 lists the various IPv6 statements you can use to configure IS-IS
topologies.

Table 5: IPv6 Statements


Statement

Description

ipv6-multicast

Enables an alternate IPv6 multicast topology.

ipv6-multicast-metric number

Configures the multicast metric for an alternate IPv6 multicast topology.

ipv6-unicast-metric number

Configures the unicast metric for an alternate IPv6 multicast topology.

no-ipv6-multicast

Excludes an interface from the IPv6 multicast topology.

no-ipv6-unicast

Excludes an interface from the IPv6 unicast topologies.

For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
Related
Documentation

Example: Configuring IS-IS Multicast Topology on page 128

Example: Configuring IS-IS Multicast Topology


This example shows how to configure a multicast topology for an IS-IS network.

128

Requirements on page 129

Overview on page 129

Configuration on page 129

Verification on page 133

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Requirements
Before you begin, configure IS-IS on all routers. See Example: Configuring IS-IS on
page 14 for information about the required IS-IS configuration.
This example uses the following hardware and software components:

Junos OS Release 7.3 or later

M Series, MX Series, and T Series routers

Overview
This example shows an IS-IS multicast topology configuration. Three routers are
connected to each other. A loopback interface is configured on each router.
Figure 13 on page 129 shows the sample network.

Figure 13: Configuring IS-IS Multicast Topology

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Router R1
set protocols isis traceoptions file isis size 5m world-readable

Copyright 2015, Juniper Networks, Inc.

129

IS-IS Feature Guide for Routing Devices

set protocols isis traceoptions flag error


set protocols isis topologies ipv4-multicast
set protocols isis interface so-0/0/0 level 1 metric 15
set protocols isis interface so-0/0/0 level 1 ipv4-multicast-metric 18
set protocols isis interface so-0/0/0 level 2 metric 20
set protocols isis interface so-0/0/0 level 2 ipv4-multicast-metric 14
set protocols isis interface so-1/0/0 level 1 metric 13
set protocols isis interface so-1/0/0 level 1 ipv4-multicast-metric 12
set protocols isis interface so-1/0/0 level 2 metric 29
set protocols isis interface so-1/0/0 level 2 ipv4-multicast-metric 23
set protocols isis interface fxp0.0 disable

Router R2
set protocols isis traceoptions file isis size 5m world-readable
set protocols isis traceoptions flag error
set protocols isis topologies ipv4-multicast
set protocols isis interface so-0/0/0 level 1 metric 13
set protocols isis interface so-0/0/0 level 1 ipv4-multicast-metric 12
set protocols isis interface so-0/0/0 level 2 metric 29
set protocols isis interface so-0/0/0 level 2 ipv4-multicast-metric 23
set protocols isis interface so-1/0/0 level 1 metric 14
set protocols isis interface so-1/0/0 level 1 ipv4-multicast-metric 18
set protocols isis interface so-1/0/0 level 2 metric 32
set protocols isis interface so-1/0/0 level 2 ipv4-multicast-metric 26
set protocols isis interface fxp0.0 disable

Router R3
set protocols isis traceoptions file isis size 5m world-readable
set protocols isis traceoptions flag error
set protocols isis topologies ipv4-multicast
set protocols isis interface so-0/0/0 level 1 metric 19
set protocols isis interface so-0/0/0 level 1 ipv4-multicast-metric 11
set protocols isis interface so-0/0/0 level 2 metric 27
set protocols isis interface so-0/0/0 level 2 ipv4-multicast-metric 21
set protocols isis interface so-1/0/0 level 1 metric 16
set protocols isis interface so-1/0/0 level 1 ipv4-multicast-metric 26
set protocols isis interface so-1/0/0 level 2 metric 30
set protocols isis interface so-1/0/0 level 2 ipv4-multicast-metric 20
set protocols isis interface fxp0.0 disable

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS multicast topologies:
1.

Enable the multicast topology for IS-IS by using the ipv4-multicast statement.
Routers R1, R2, and R3
[edit protocols isis]
user@host# set traceoptions file isis size 5m world-readable
user@host# set traceoptions flag error
user@host# set topologies ipv4-multicast

130

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

2. Enable multicast metrics on the first SONET/SDH Interface by using the

ipv4-multicast-metric statement.

Router R1
[edit protocols isis interface so-0/0/0 ]
user@R1# set level 1 metric 15
user@R1# set level 1 ipv4-multicast-metric 18
user@R1# set level 2 metric 20
user@R1# set level 2 ipv4-multicast-metric 14

Router R2
[edit protocols isis interface so-0/0/0]
user@R2# set level 1 metric 13
user@R2# set level 1 ipv4-multicast-metric 12
user@R2# set level 2 metric 29
user@R2# set level 2 ipv4-multicast-metric 23

Router R3
[edit protocols isis interface so-0/0/0]
user@R3# set level 1 metric 19
user@R3# set level 1 ipv4-multicast-metric 11
user@R3# set level 2 metric 27
user@R3# set level 2 ipv4-multicast-metric 21
3. Enable multicast metrics on a second sonet Interface by using the ipv4-multicast-metric

statement.
Router R1
[edit protocols isis interface so-1/0/0]
user@R1# set level 1 metric 13
user@R1# set level 1 ipv4-multicast-metric 12
user@R1# set level 2 metric 29
user@R1# set level 2 ipv4-multicast-metric 23

Router R2
[edit protocols isis interface so-1/0/0]
user@R2# set level 1 metric 14
user@R2# set level 1 ipv4-multicast-metric 18
user@R2# set level 2 metric 32
user@R2# set level 2 ipv4-multicast-metric 26

Router R3
[edit protocols isis interface so-1/0/0]
user@R3# set level 1 metric 16
user@R3# set level 1 ipv4-multicast-metric 26
user@R3# set level 2 metric 30
user@R3# set level 2 ipv4-multicast-metric 20
4. Disable the out-of-band management port, fxp0.

Routers R1, R2, and R3


[edit protocols isis]
user@host# set interface fxp0.0 disable

Copyright 2015, Juniper Networks, Inc.

131

IS-IS Feature Guide for Routing Devices

5. If you are done configuring the routers, commit the configuration.

Routers R1, R2, and R3


[edit]
user@host# commit

Results

From configuration mode, confirm your configuration by using the show protocols isis
statement. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
Router R1
user@R1# show protocols isis
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 15;
ipv4-multicast-metric 18;
}
level 2 {
metric 20;
ipv4-multicast-metric 14;
}
}
interface so-1/0/0 {
level 1 {
metric 13;
ipv4-multicast-metric 12;
}
level 2 {
metric 29;
ipv4-multicast-metric 23;
}
}
interface fxp0.0 {
disable;
}

Router R2
user@R2# show protocols isis
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 13;
ipv4-multicast-metric 12;
}
level 2 {
metric 29;
ipv4-multicast-metric 23;

132

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

}
}
interface so-1/0/0 {
level 1 {
metric 14;
ipv4-multicast-metric 18;
}
level 2 {
metric 32;
ipv4-multicast-metric 26;
}
}
interface fxp0.0 {
disable;
}

Router R3
user@R3# show protocols isis
traceoptions {
file isis size 5m world-readable;
flag error;
}
topologies ipv4-multicast;
interface so-0/0/0 {
level 1 {
metric 19;
ipv4-multicast-metric 11;
}
level 2 {
metric 27;
ipv4-multicast-metric 21;
}
}
interface so-1/0/0 {
level 1 {
metric 16;
ipv4-multicast-metric 26;
}
level 2 {
metric 30;
ipv4-multicast-metric 20;
}
}
interface fxp0.0 {
disable;
}

Verification
Confirm that the configuration is working properly.

Verifying the Connection Between Routers R1, R2, and R3 on page 134

Verifying That IS-IS Is Configured on page 135

Verifying the Configured Multicast Metric Values on page 137

Verifying the Configuration of the Multicast Topology on page 138

Copyright 2015, Juniper Networks, Inc.

133

IS-IS Feature Guide for Routing Devices

Verifying the Connection Between Routers R1, R2, and R3


Purpose
Action

Make sure that Routers R1, R2, and R3 are connected to each other.
Ping the other two routers from any router, to check the connectivity between the three
routers as per the network topology.
user@R1> ping 10.0.3.9
PING 10.0.3.9 (10.0.3.9): 56 data bytes
64 bytes from 10.0.3.9: icmp_seq=0 ttl=64 time=1.299 ms
64 bytes from 10.0.3.9: icmp_seq=1 ttl=64 time=52.304 ms
64 bytes from 10.0.3.9: icmp_seq=2 ttl=64 time=1.271 ms
64 bytes from 10.0.3.9: icmp_seq=3 ttl=64 time=1.343 ms
64 bytes from 10.0.3.9: icmp_seq=4 ttl=64 time=1.434 ms
64 bytes from 10.0.3.9: icmp_seq=5 ttl=64 time=1.306 ms
^C
--- 10.0.3.9 ping statistics --6 packets transmitted, 6 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.271/9.826/52.304/18.997 ms
user@R1> ping 10.0.3.10
PING 10.0.3.10 (10.0.3.10): 56 data bytes
64 bytes from 10.0.3.10: icmp_seq=0 ttl=64 time=1.431 ms
64 bytes from 10.0.3.10: icmp_seq=1 ttl=64 time=1.296 ms
64 bytes from 10.0.3.10: icmp_seq=2 ttl=64 time=1.887 ms
^C
--- 10.0.3.10 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.296/1.538/1.887/0.253 ms
user@R2> ping 10.0.2.9
PING 10.0.2.9 (10.0.2.9): 56 data bytes
64 bytes from 10.0.2.9: icmp_seq=0 ttl=64 time=1.365 ms
64 bytes from 10.0.2.9: icmp_seq=1 ttl=64 time=1.813 ms
64 bytes from 10.0.2.9: icmp_seq=2 ttl=64 time=1.290 ms
^C
--- 10.0.2.9 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.290/1.489/1.813/0.231 ms
user@R2> ping 10.0.2.10
PING 10.0.2.10 (10.0.2.10): 56 data bytes
64 bytes from 10.0.2.10: icmp_seq=0 ttl=63 time=1.318 ms
64 bytes from 10.0.2.10: icmp_seq=1 ttl=63 time=1.394 ms
64 bytes from 10.0.2.10: icmp_seq=2 ttl=63 time=1.366 ms
64 bytes from 10.0.2.10: icmp_seq=3 ttl=63 time=1.305 ms
^C
--- 10.0.2.10 ping statistics --4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.305/1.346/1.394/0.036 ms
user@R3> ping 10.0.1.10
PING 10.0.1.10 (10.0.1.10): 56 data bytes
64 bytes from 10.0.1.10: icmp_seq=0 ttl=63 time=1.316 ms

134

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

64 bytes from 10.0.1.10: icmp_seq=1 ttl=63 time=1.418 ms


64 bytes from 10.0.1.10: icmp_seq=2 ttl=63 time=1.277 ms
^C
--- 10.0.1.10 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.277/1.337/1.418/0.059 ms
user@R3> ping 10.0.1.9
PING 10.0.1.9 (10.0.1.9): 56 data bytes
64 bytes from 10.0.1.9: icmp_seq=0 ttl=64 time=1.381 ms
64 bytes from 10.0.1.9: icmp_seq=1 ttl=64 time=1.499 ms
64 bytes from 10.0.1.9: icmp_seq=2 ttl=64 time=1.300 ms
64 bytes from 10.0.1.9: icmp_seq=3 ttl=64 time=1.397 ms
^C
--- 10.0.1.9 ping statistics --4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.300/1.394/1.499/0.071 ms

Meaning

Routers R1, R2, and R3 have a peer relationship with each other.

Verifying That IS-IS Is Configured


Purpose

Make sure that the IS-IS instance is running on Routers R1, R2, and R3, and that they are
adjacent to each other.

Action

Use the show isis adjacency detail command to check the adjacency between the routers.
Router R1
user@R1> show isis adjacency detail
R2
Interface: so-0/0/0, Level: 1, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:23:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.10
R2
Interface: so-0/0/0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:23:58 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.10
R3
Interface: so-1/0/0, Level: 1, State: Up, Expires in 7 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:24:20 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.10
R3
Interface: so-1/0/0, Level: 2, State: Up, Expires in 6 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:24:20 ago

Copyright 2015, Juniper Networks, Inc.

135

IS-IS Feature Guide for Routing Devices

Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd


Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.10

Router R2
user@R2> show isis adjacency detail
R1
Interface: so-0/0/0, Level: 1, State: Up, Expires in 20 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:50 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.9
R1
Interface: so-0/0/0, Level: 2, State: Up, Expires in 26 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:50 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R2.02, IP addresses: 10.0.1.9
R3
Interface: so-1/0/0, Level: 1, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:22 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.10
R3
Interface: so-1/0/0, Level: 2, State: Up, Expires in 8 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:27:22 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bd
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.10

Router R3
user@R3> show isis adjacency detail
R2
Interface: so-0/0/0, Level: 1, State: Up, Expires in 18 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:09 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.9
R2
Interface: so-0/0/0, Level: 2, State: Up, Expires in 22 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:09 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.03, IP addresses: 10.0.3.9
R1

136

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Interface: so-1/0/0, Level: 1, State: Up, Expires in 21 secs


Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.9
R1
Interface: so-1/0/0, Level: 2, State: Up, Expires in 19 secs
Priority: 64, Up/Down transitions: 1, Last transition: 2d 19:33:59 ago
Circuit type: 3, Speaks: IP, MAC address: 0:1b:c0:86:54:bc
Topologies: IPV4-Multicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: R3.02, IP addresses: 10.0.2.9

Meaning

IS-IS is configured on Routers R1, R2, and R3, and they are adjacent to each other.

Verifying the Configured Multicast Metric Values


Purpose

Action

Make sure that the SPF calculations are accurate as per the configured multicast metric
values on Routers R1, R2, and R3.
Use the show isis spf results command to check the SPF calculations for the network.
Router R1
user@R1> show isis spf results
...
IPV4 Multicast IS-IS level 1 SPF results:
Node
Metric
Interface
NH
Via
R3.03 28
so-1/0/0
IPV4 R3
R2.00 18
so-0/0/0
IPV4 R2
R3.00 17
so-1/0/0
IPV4 R3
R1.00 0
4 nodes
IPV4 Multicast IS-IS level 2 SPF results:
Node
Metric
Interface
NH
Via
R3.03 40
so-0/0/0
IPV4 R2
R3.00 22
so-1/0/0
IPV4 R3
R2.00 14
so-0/0/0
IPV4 R2
R1.00 0
4 nodes

SNPA
0:1b:c0:86:54:bd
0:1b:c0:86:54:bd
0:1b:c0:86:54:bd

SNPA
0:1b:c0:86:54:bd
0:1b:c0:86:54:bd
0:1b:c0:86:54:bd

Router R2
user@R2> show isis spf results
...
IPV4 Multicast IS-IS level 1 SPF results:
Node
Metric
Interface
NH
Via
R3.02 29
so-0/0/0
IPV4 R1
R3.00 18
so-1/0/0
IPV4 R3
R1.00 12
so-0/0/0
IPV4 R1
R2.02 12
R2.00 0
5 nodes
IPV4 Multicast IS-IS level 2 SPF results:
Node
Metric
Interface
NH
Via

Copyright 2015, Juniper Networks, Inc.

SNPA
0:1b:c0:86:54:bc
0:1b:c0:86:54:bd
0:1b:c0:86:54:bc

SNPA

137

IS-IS Feature Guide for Routing Devices

R3.02 45
R3.00 26
R1.00 23
R2.02 23
R2.00 0
5 nodes

so-0/0/0
so-1/0/0
so-0/0/0

IPV4 R1
IPV4 R3
IPV4 R1

0:1b:c0:86:54:bc
0:1b:c0:86:54:bd
0:1b:c0:86:54:bc

Router R3
user@R3> show isis spf results
...
IPV4 Multicast IS-IS level 1 SPF results:
Node
Metric
Interface
NH
Via
R3.02 26
R1.00 23
so-0/0/0
IPV4 R2
R2.02 23
so-0/0/0
IPV4 R2
R2.00 11
so-0/0/0
IPV4 R2
R3.03 11
R3.00 0
6 nodes
IPV4 Multicast IS-IS level 2 SPF results:
Node
Metric
Interface
NH
Via
R2.02 34
so-1/0/0
IPV4 R1
R2.00 21
so-0/0/0
IPV4 R2
R3.03 21
R1.00 20
so-1/0/0
IPV4 R1
R3.02 20
R3.00 0
6 nodes

Meaning

SNPA
0:1b:c0:86:54:bc
0:1b:c0:86:54:bc
0:1b:c0:86:54:bc

SNPA
0:1b:c0:86:54:bc
0:1b:c0:86:54:bc
0:1b:c0:86:54:bc

The configured multicast metric values are used in SPF calculations for the IS-IS network.

Verifying the Configuration of the Multicast Topology


Purpose
Action

Make sure that the multicast topology is configured on Routers R1, R2, and R3.
Use the show isis database detail command to verify the multicast topology configuration
on the routers.
Router R1
user@R1> show isis database detail
IS-IS level 1 link-state database:
R1.00-00 Sequence: 0x142, Checksum: 0xd07, Lifetime: 663 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
15
IPV4 Unicast IS neighbor: R3.02
Metric:
15
IPV4 Multicast IS neighbor: R2.02 Metric:
18
IPV4 Multicast IS neighbor: R3.02 Metric:
17
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
15 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
15 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0xf02b, Lifetime: 883 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
13
IPV4 Unicast IS neighbor: R3.03
Metric:
14
IPV4 Multicast IS neighbor: R2.02 Metric:
12
IPV4 Multicast IS neighbor: R3.03 Metric:
18

138

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

IP IPV4 Unicast prefix: 10.0.1.8/30


IP IPV4 Unicast prefix: 10.0.3.8/30

Metric:
Metric:

13 Internal Up
14 Internal Up

R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 913 secs


IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13c, Checksum: 0xc8de, Lifetime: 488 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
16
IPV4 Unicast IS neighbor: R3.03
Metric:
19
IPV4 Multicast IS neighbor: R3.02 Metric:
26
IPV4 Multicast IS neighbor: R3.03 Metric:
11
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
16 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
19 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 625 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
R3.03-00 Sequence: 0x138, Checksum: 0xad56, Lifetime: 714 secs
IPV4 Unicast IS neighbor: R2.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
IS-IS level 2 link-state database:
R1.00-00 Sequence: 0x142, Checksum: 0x2c7c, Lifetime: 816 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
20
IPV4 Unicast IS neighbor: R3.02
Metric:
31
IPV4 Multicast IS neighbor: R2.02 Metric:
14
IPV4 Multicast IS neighbor: R3.02 Metric:
22
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
20 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
29 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0x4826, Lifetime: 966 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
29
IPV4 Unicast IS neighbor: R3.03
Metric:
32
IPV4 Multicast IS neighbor: R2.02 Metric:
23
IPV4 Multicast IS neighbor: R3.03 Metric:
26
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
29 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
28 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
32 Internal Up
R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 966 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13d, Checksum: 0x1b19, Lifetime: 805 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
30
IPV4 Unicast IS neighbor: R3.03
Metric:
27
IPV4 Multicast IS neighbor: R3.02 Metric:
20
IPV4 Multicast IS neighbor: R3.03 Metric:
21
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
30 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
27 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 844 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
R3.03-00 Sequence: 0x139, Checksum: 0xab57, Lifetime: 844 secs

Copyright 2015, Juniper Networks, Inc.

139

IS-IS Feature Guide for Routing Devices

IPV4 Unicast IS neighbor: R2.00


IPV4 Unicast IS neighbor: R3.00

Metric:
Metric:

0
0

Router R2
user@R2> show isis database detail
IS-IS level 1 link-state database:
R1.00-00 Sequence: 0x142, Checksum: 0xd07, Lifetime: 524 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
15
IPV4 Unicast IS neighbor: R3.02
Metric:
15
IPV4 Multicast IS neighbor: R2.02
Metric:
18
IPV4 Multicast IS neighbor: R3.02
Metric:
17
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
15 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
15 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0xf02b, Lifetime: 748 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
13
IPV4 Unicast IS neighbor: R3.03
Metric:
14
IPV4 Multicast IS neighbor: R2.02
Metric:
12
IPV4 Multicast IS neighbor: R3.03
Metric:
18
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
13 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
14 Internal Up
R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 777 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13d, Checksum: 0xc6df, Lifetime: 1102 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
16
IPV4 Unicast IS neighbor: R3.03
Metric:
19
IPV4 Multicast IS neighbor: R3.02
Metric:
26
IPV4 Multicast IS neighbor: R3.03
Metric:
11
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
16 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
19 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 488 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
R3.03-00 Sequence: 0x138, Checksum: 0xad56, Lifetime: 577 secs
IPV4 Unicast IS neighbor: R2.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
IS-IS level 2 link-state database:
R1.00-00 Sequence: 0x142, Checksum: 0x2c7c, Lifetime: 676 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
20
IPV4 Unicast IS neighbor: R3.02
Metric:
31
IPV4 Multicast IS neighbor: R2.02
Metric:
14
IPV4 Multicast IS neighbor: R3.02
Metric:
22
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
20 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
29 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0x4826, Lifetime: 831 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
29
IPV4 Unicast IS neighbor: R3.03
Metric:
32
IPV4 Multicast IS neighbor: R2.02
Metric:
23
IPV4 Multicast IS neighbor: R3.03
Metric:
26
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
29 Internal Up

140

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

IP IPV4 Unicast prefix: 10.0.2.8/30


IP IPV4 Unicast prefix: 10.0.3.8/30

Metric:
Metric:

28 Internal Up
32 Internal Up

R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 831 secs


IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13d, Checksum: 0x1b19, Lifetime: 667 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
30
IPV4 Unicast IS neighbor: R3.03
Metric:
27
IPV4 Multicast IS neighbor: R3.02
Metric:
20
IPV4 Multicast IS neighbor: R3.03
Metric:
21
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
30 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
27 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 707 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
R3.03-00 Sequence: 0x139, Checksum: 0xab57, Lifetime: 707 secs
IPV4 Unicast IS neighbor: R2.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0

Router R3
user@R3> show isis database detail
IS-IS level 1 link-state database:
R1.00-00 Sequence: 0x143, Checksum: 0xb08, Lifetime: 1155 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
15
IPV4 Unicast IS neighbor: R3.02
Metric:
15
IPV4 Multicast IS neighbor: R2.02
Metric:
18
IPV4 Multicast IS neighbor: R3.02
Metric:
17
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
15 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
15 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0xf02b, Lifetime: 687 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
13
IPV4 Unicast IS neighbor: R3.03
Metric:
14
IPV4 Multicast IS neighbor: R2.02
Metric:
12
IPV4 Multicast IS neighbor: R3.03
Metric:
18
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
13 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
14 Internal Up
R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 716 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13d, Checksum: 0xc6df, Lifetime: 1044 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
16
IPV4 Unicast IS neighbor: R3.03
Metric:
19
IPV4 Multicast IS neighbor: R3.02
Metric:
26
IPV4 Multicast IS neighbor: R3.03
Metric:
11
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
16 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
19 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 430 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0

Copyright 2015, Juniper Networks, Inc.

141

IS-IS Feature Guide for Routing Devices

R3.03-00 Sequence: 0x138, Checksum: 0xad56, Lifetime: 519 secs


IPV4 Unicast IS neighbor: R2.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
IS-IS level 2 link-state database:
R1.00-00 Sequence: 0x142, Checksum: 0x2c7c, Lifetime: 617 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
20
IPV4 Unicast IS neighbor: R3.02
Metric:
31
IPV4 Multicast IS neighbor: R2.02
Metric:
14
IPV4 Multicast IS neighbor: R3.02
Metric:
22
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
20 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
29 Internal Up
R2.00-00 Sequence: 0x13f, Checksum: 0x4826, Lifetime: 769 secs
IPV4 Unicast IS neighbor: R2.02
Metric:
29
IPV4 Unicast IS neighbor: R3.03
Metric:
32
IPV4 Multicast IS neighbor: R2.02
Metric:
23
IPV4 Multicast IS neighbor: R3.03
Metric:
26
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
29 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
28 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
32 Internal Up
R2.02-00 Sequence: 0x13c, Checksum: 0x57e2, Lifetime: 769 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R2.00
Metric:
0
R3.00-00 Sequence: 0x13d, Checksum: 0x1b19, Lifetime: 610 secs
IPV4 Unicast IS neighbor: R3.02
Metric:
30
IPV4 Unicast IS neighbor: R3.03
Metric:
27
IPV4 Multicast IS neighbor: R3.02
Metric:
20
IPV4 Multicast IS neighbor: R3.03
Metric:
21
IP IPV4 Unicast prefix: 10.0.1.8/30 Metric:
31 Internal Up
IP IPV4 Unicast prefix: 10.0.2.8/30 Metric:
30 Internal Up
IP IPV4 Unicast prefix: 10.0.3.8/30 Metric:
27 Internal Up
R3.02-00 Sequence: 0x139, Checksum: 0xfb0e, Lifetime: 649 secs
IPV4 Unicast IS neighbor: R1.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0
R3.03-00 Sequence: 0x139, Checksum: 0xab57, Lifetime: 649 secs
IPV4 Unicast IS neighbor: R2.00
Metric:
0
IPV4 Unicast IS neighbor: R3.00
Metric:
0

Meaning

Related
Documentation

Multicast topology is configured on Routers R1, R2, and R3.

IS-IS Multicast Topologies Overview on page 127

Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses


Service providers and enterprises are faced with growing their networks using IPv6, while
continuing to serve IPv4 customers.
Increasingly, the public side of network address translation (NAT) devices is IPv6 rather
than IPv4. Service providers cannot continue giving customers globally routable IPv4
addresses, they cannot get new globally routable IPv4 addresses for expanding their

142

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

own networks, and yet they must continue to serve both IPv4 customers and new
customers, all of whom are primarily trying to reach IPv4 destinations.
IPv4 and IPv6 must coexist for some number of years, and their coexistence must be
transparent to end users. If an IPv4-to-IPv6 transition is successful, end users should not
even notice it.
A dual-stack device is a device with network interfaces that can originate and understand
both IPv4 and IPv6 packets.
Other strategies, such as manually or dynamically configured tunnels and translation
devices exist, but dual stacking is often the preferable solution in many scenarios. The
dual-stacked device can interoperate equally with IPv4 devices, IPv6 devices, and other
dual-stacked devices. When both devices are dual stacked, the two devices agree on
which IP version to use.
The transition is driven by DNS. If a dual-stacked device queries the name of a destination
and DNS gives it an IPv4 address (a DNS A Record), it sends IPv4 packets. If DNS responds
with an IPv6 address (a DNS AAAA Record), it sends IPv6 packets.
Keep in mind that if you are going to dual stack all of your network devices, the interfaces
need both an IPv6 and an IPv4 address. This raises the issue that the Internet has run
out of IPv4 addresses, which is the main reason IPv6 is needed in the first place. If you
do not have an abundant supply of IPv4 addresses to apply to your devices, you can still
use dual stacking, but you will need to conserve your supply of IPv4 addresses by using
network address translation (NAT). Building dual-stacked networks with a mix of global
IPv6 addresses and NAT-ed IPv4 addresses is quite feasible. Some specific solutions
include carrier-grade NAT (CGN), NAT44(4), NAT64, NAT464, and dual-stack lite.
Table 6 on page 143 describes at a high level how to pick a network addressing technique.
In reality, a complete solution might include a set of techniques to satisfy multiple service
needs. It is important to understand the backbone technology being used on the network
and also to know if the provider has control over the access customer premises equipment
(CPE).

Table 6: Choosing the Right Solution to Address Next-Generation Addressing Requirements


CPE
Network

Access Network

IPv4

IPv4

IPv4 Internet

NAT44(4)

IPv4/IPv6

IPv6

IPv4 Internet

DS-Lite with NAT44

IPv4/IPv6

IPv4

IPv6 Internet

6rd (6to4)

IPv4

IPv6

IPv4 Internet

NAT64

Destinations
Solution

Related
Documentation

Understanding IPv6 Dual-Stack Lite

Understanding IPv6

Copyright 2015, Juniper Networks, Inc.

143

IS-IS Feature Guide for Routing Devices

Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses on
page 144

Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses
This example shows how to configure IPv4 and IPv6 dual stacking in IS-IS.

Requirements on page 144

Overview on page 144

Configuration on page 145

Verification on page 147

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Video: IS-IS Dual Stacking

You can use IPv4 and IPv6 dual stacking to begin your migration from IPv4 to IPv6 by
implementing IPv6 alongside IPv4 in your existing networks. This allows you to implement
IPv6 so that you can provide the same services over IPv6for example, video, voice,
high-quality datathat you currently provide in your IPv4 networks. You can then perform
incremental upgrades to IPv6 and avoid service disruptions while migrating from IPv4 to
IPv6.
Unlike RIP and OSPF, IS-IS does not require a distinct protocol or a new version to support
IPv6. Because IS-IS uses ISO addresses, the configuration for IPv6 and IPv4 is identical
in the Junos OS implementation of IS-IS. For IS-IS to carry IPv6 routes, you only need to
add IPv6 addresses to IS-IS enabled interfaces or include other IPv6 routes in your IS-IS
export policy.
The only explicit configuration needed in IS-IS with regard to IPv6 is if you want to disable
it. Alternatively, you can disable IPv4 routing and use IS-IS with IPv6 only. An example
of each is provided here:
Disable IPv6 routing in IS-IS:
[edit protocols isis]
user@host# set no-ipv6-routing

Use IS-IS exclusively for IPv6 routing:


[edit protocols isis]
user@host# set no-ipv4-routing

Figure 14 on page 145 shows the topology used in this example.

144

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Figure 14: IS-IS IPv4 and IPv6 Dual Stacking Topology


IPv6
IPv4

fe-1/2/0

R1
fe-1/2/1

.1

10.0.0.0/30

.17

2001:db8:0:1::/64

10.0.0.16/30
fe-1/2/0

fe-1/2/0
2001:db8:0:5::/64

.18

R3

g041305

R2

.2

CLI Quick Configuration on page 145 shows the configuration for all of the devices in
Figure 14 on page 145. The section Step-by-Step Procedure on page 146 describes the
steps on Device R1.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::1/128
set protocols isis interface fe-1/2/0.0
set protocols isis interface fe-1/2/1.0
set protocols isis interface lo0.0

Device R2

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::2/128
set protocols isis interface fe-1/2/0.0
set protocols isis interface lo0.0

Device R3

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::3/128

Copyright 2015, Juniper Networks, Inc.

145

IS-IS Feature Guide for Routing Devices

set protocols isis interface fe-1/2/0.0


set protocols isis interface lo0.0

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the Junos OS CLI User Guide.
To configure IS-IS dual stacking:
1.

Configure the interfaces, including both IPv4 and IPv6 addresses on each interface.
Optionally, include the eui-64 statement to automatically generate the host number
portion of interface addresses.
[edit interfaces]
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set fe-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
user@R1# set fe-1/2/1 unit 0 family inet address 10.0.0.17/30
user@R1# set fe-1/2/1 unit 0 family iso
user@R1# set fe-1/2/1 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
user@R1# set lo0 unit 0 family inet6 address 2001:db8::1/128

2.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@R1# set interface fe-1/2/0.0
user@R1# set interface fe-1/2/1.0
user@R1# set interface lo0.0

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show interfaces
fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.1/30;
}
family iso;
family inet6 {
address 2001:db8:0:5::/64 {
eui-64;
}
}
}
}
fe-1/2/1 {
unit 0 {
family inet {
address 10.0.0.17/30;
}
family iso;

146

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

family inet6 {
address 2001:db8:0:1::/64 {
eui-64;
}
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
family inet6 {
address 2001:db8::1/128;
}
}
}
user@R1# show protocols
isis {
interface fe-1/2/0.0;
interface fe-1/2/1.0;
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Checking the Neighbor Adjacencies on page 147

Pinging the IPv6 Interfaces on page 148

Checking the IPv6 Routing Table on page 149

Checking the Neighbor Adjacencies


Purpose

Determine what topologies are supported on neighboring IS-IS devices.

Action

From operational mode, enter the show isis adjacency detail command.
user@R1> show isis adjacency detail
R2
Interface: fe-1/2/0.0, Level: 3, State: Up, Expires in 24 secs
Priority: 0, Up/Down transitions: 1, Last transition: 18:34:08 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.2
IPv6 addresses: fe80::2a0:a514:0:24c
R3

Copyright 2015, Juniper Networks, Inc.

147

IS-IS Feature Guide for Routing Devices

Interface: fe-1/2/1.0, Level: 3, State: Up, Expires in 21 secs


Priority: 0, Up/Down transitions: 1, Last transition: 18:33:41 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.18
IPv6 addresses: fe80::2a0:a514:0:124c

Meaning

As expected, the output shows that the two neighbors support both IPv4 and IPv6. The
IPv4 address and the IPv6 link-local address are also shown.

Pinging the IPv6 Interfaces


Purpose
Action

Make sure that you can ping the remote IPv6 interfaces.
From operational mode, enter the ping command to ping from Device R2 to Device R3.
1.

Determine the IPv6 address assigned to Device R3.


If you use EUI-64 addressing as shown in the example, the host portion of the IPv6
addresses is assigned automatically. To determine what addresses are assigned, use
the show interfaces terse command on Device R3.
user@R3> show interfaces terse
Interface
Admin Link Proto
fe-1/2/0
fe-1/2/0.0
up
up
inet
iso
inet6
lo0
lo0.0

up

up

inet
iso
inet6

Local

Remote

10.0.0.18/30
2001:db8:0:1:2a0:a514:0:124c/64
fe80::2a0:a514:0:124c/64
192.168.0.3
--> 0/0
49.0002.0192.0168.0003
2001:db8::3
fe80::2a0:a50f:fc56:14c

The IPv6 addresses that should be pingable are 2001:db8:0:1:2a0:a514:0:124c and


2001:db8::3.
2. From Device R2, ping the Device R3 fe-1/2/0.0 IPv6 interface address and the lo0.0

IPv6 interface address.


user@R2> ping 2001:db8:0:1:2a0:a514:0:124c
PING6(56=40+8+8 bytes) 2001:db8:0:5:2a0:a514:0:24c -->
2001:db8:0:1:2a0:a514:0:124c
16 bytes from 2001:db8:0:1:2a0:a514:0:124c, icmp_seq=0 hlim=63 time=2.373 ms
16 bytes from 2001:db8:0:1:2a0:a514:0:124c, icmp_seq=1 hlim=63 time=1.600 ms
16 bytes from 2001:db8:0:1:2a0:a514:0:124c, icmp_seq=2 hlim=63 time=2.228 ms
user@R2> ping 2001:db8::3
PING6(56=40+8+8 bytes) 2001:db8:0:5:2a0:a514:0:24c --> 2001:db8::3
16 bytes from 2001:db8::3, icmp_seq=0 hlim=63 time=1.797 ms
16 bytes from 2001:db8::3, icmp_seq=1 hlim=63 time=1.430 ms
16 bytes from 2001:db8::3, icmp_seq=2 hlim=63 time=2.525 ms

Meaning

148

This test confirms that IS-IS has learned the IPv6 routes.

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Checking the IPv6 Routing Table


Purpose

Action

Verify that the expected routes are in the IPv6 routing table.

user@R1> show route table inet6.0


inet6.0: 11 destinations, 12 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
2001:db8::1/128

*[Direct/0] 18:52:52
>
via lo0.0
2001:db8::2/128
*[IS-IS/15] 01:59:52, metric 10
> to fe80::2a0:a514:0:24c via fe-1/2/0.0
2001:db8::3/128
*[IS-IS/15] 01:59:52, metric 10
> to fe80::2a0:a514:0:124c via fe-1/2/1.0
2001:db8:0:1::/64 *[Direct/0] 18:52:15
>
via fe-1/2/1.0
2001:db8:0:1:2a0:a514:0:114c/128
*[Local/0] 18:52:48
Local via fe-1/2/1.0
2001:db8:0:5::/64 *[Direct/0] 18:52:49
>
via fe-1/2/0.0
2001:db8:0:5:2a0:a514:0:14c/128
*[Local/0] 18:52:49
Local via fe-1/2/0.0
fe80::/64
*[Direct/0] 18:52:49
>
via fe-1/2/0.0
[Direct/0] 18:52:15
>
via fe-1/2/1.0
fe80::2a0:a50f:fc56:14c/128
*[Direct/0] 18:52:52
>
via lo0.0
fe80::2a0:a514:0:14c/128
*[Local/0] 18:52:49
Local via fe-1/2/0.0
fe80::2a0:a514:0:114c/128
*[Local/0] 18:52:48
Local via fe-1/2/1.0

Meaning

Related
Documentation

The output shows the IPv6 interface routes (direct and local) and the IPv6 routes learned
through IS-IS.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

149

IS-IS Feature Guide for Routing Devices

Understanding IS-IS IPv4 and IPv6 Unicast Topologies


You can configure IS-IS to calculate an alternate IPv6 unicast topology, in addition to
the normal IPv4 unicast topology, and add the corresponding routes to inet6.0. The IS-IS
interface metrics for the IPv4 topology can be configured independently of the IPv6
metrics. You can also selectively disable interfaces from participating in the IPv6 topology
while continuing to participate in the IPv4 topology. This enables you to exercise control
over the paths that unicast data takes through a network.
A topology is the set of joined nodes. IS-IS evaluates all the paths in a single topology
for each IS-IS level and uses the shortest-path-first (SPF) algorithm to determine the
best path among all the feasible paths. Topology discovery and SPF calculation is
performed in a protocol-neutral fashion because it is done at Layer 2 of the OSI model.
If you load the topology with reachability information for a certain protocol (for example,
IP), the assumption is that the circuits that are supposed to provide reachability between
routing devices can carry the protocol. The SPF algorithm has a per-link orientation, not
a per-address family or per-protocol orientation.
Multitopology routing enables you to override this default behavior by enabling a
per-address family, per-protocol SPF calculation.
The additional CPU load associated with multiple runs of the SPF algorithm is generally
not an issue with the processing power available on todays routing device control planes.
The multitopology extensions alter existing type, length, and value (TLV) tuples by adding
a topology ID. Each routing device in a given topology maintains its adjacencies and runs
a per-topology SPF calculation.
Related
Documentation

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies


This example shows how to configure IS-IS to calculate an alternate IPv6 unicast topology,
in addition to the normal IPv4 unicast topology.

Requirements on page 150

Overview on page 150

Configuration on page 152

Verification on page 156

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
This example focuses on IPv4 and IPv6 unicast topologies. The IS-IS interface metrics
for the IPv4 topology can be configured independently of the IPv6 metrics. You can also

150

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

selectively disable interfaces from participating in the IPv6 topology while continuing to
participate in the IPv4 topology. This enables you to exercise control over the paths that
unicast data takes through a network.
To enable an IPv6 unicast topology for IS-IS, include the ipv6-unicast statement:
isis {
topologies {
ipv6-unicast;
}
}

To configure a metric for the IPv6 unicast topology, include the ipv6-unicast-metric
statement:
isis {
interface interface-name {
level level-number {
ipv6-unicast-metric number;
}
}
}

To exclude an interface from the IPv6 unicast topologies for IS-IS, include the
no-ipv6-unicast statement:
isis {
interface interface-name {
no-ipv6-unicast;
}
}

Figure 15 on page 152 shows the topology used in this example. The black lines indicate
link membership in the IPv6 topology. The gray lines indicate membership to the IPv4
topology. Using regular TLVs, it would not be possible to build multiple topologies and
run an SPF calculation based on them. The multitopology extensions describe an
extension to carry the set of supported protocols in the hello packet. After activating
multitopology routing support on a link, the link carries all the topologies that the
underlying circuit is able to relay.

Copyright 2015, Juniper Networks, Inc.

151

IS-IS Feature Guide for Routing Devices

Figure 15: IS-IS IPv4 and IPv6 Unicast Topologies

so-1/2/0

R1
so-1/2/2

.1
.13 .17

10.0.0.0/30

2001:db8:0:1::/64

10.0.0.16/30
so-1/2/0

.2

so-1/2/0
2001:db8:0:5::/64

.18

R2
.9 so-1/2/1

10.0.0.12/30

so-1/2/1 .25

10.0.0.8/30 2001:db8:0:4::/64

so-1/2/1

10.0.0.24/30

.10

.21

R4
so-1/2/0

R3

10.0.0.20/30

so-1/2/2
.5

.14 .26 so-1/2/2


so-1/2/0
.22
R5
so-1/2/1
so-1/2/3

2001:db8:0:2::/64

10.0.0.4.30

2001:db8:0:3::/64
.6

so-1/2/0

so-1/2/1

IPv6
IPv4

g041296

R6

CLI Quick Configuration on page 152 shows the configuration for all of the devices in
Figure 15 on page 152. The section Step-by-Step Procedure on page 154 describes the
steps on Device R1.

Configuration
CLI Quick
Configuration

Device R1

152

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces so-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
set interfaces so-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces so-1/2/1 unit 0 family iso
set interfaces so-1/2/2 unit 0 family inet address 10.0.0.17/30
set interfaces so-1/2/2 unit 0 family iso
set interfaces so-1/2/2 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::1/128
set protocols isis topologies ipv6-unicast
set protocols isis interface so-1/2/0.0
set protocols isis interface so-1/2/1.0 no-ipv6-unicast
set protocols isis interface so-1/2/2.0
set protocols isis interface lo0.0

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Device R2

set interfaces so-1/2/0 unit 0 family inet address 10.0.0.2/30


set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
set interfaces so-1/2/1 unit 0 family inet address 10.0.0.9/30
set interfaces so-1/2/1 unit 0 family iso
set interfaces so-1/2/1 unit 0 family inet6 address 2001:db8:0:4::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::2/128
set protocols isis topologies ipv6-unicast
set protocols isis interface so-1/2/0.2
set protocols isis interface so-1/2/1.0
set protocols isis interface lo0.0

Device R3

set interfaces so-1/2/0 unit 0 family inet address 10.0.0.18/30


set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/0 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
set interfaces so-1/2/1 unit 0 family inet address 10.0.0.25/30
set interfaces so-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::3/128
set protocols isis topologies ipv6-unicast
set protocols isis interface so-1/2/0.0
set protocols isis interface so-1/2/1.0 no-ipv6-unicast
set protocols isis interface lo0.0

Device R4

set interfaces so-1/2/0 unit 0 family inet address 10.0.0.5/30


set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/0 unit 0 family inet6 address 2001:db8:0:2::/64 eui-64
set interfaces so-1/2/1 unit 0 family inet address 10.0.0.10/30
set interfaces so-1/2/1 unit 0 family iso
set interfaces so-1/2/1 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
set interfaces so-1/2/2 unit 0 family inet address 10.0.0.21/30
set interfaces so-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0004.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::4/128
set protocols isis topologies ipv6-unicast
set protocols isis interface so-1/2/0.0
set protocols isis interface so-1/2/1.0
set protocols isis interface so-1/2/2.0 no-ipv6-unicast
set protocols isis interface lo0.0

Device R5

set interfaces so-1/2/0 unit 0 family inet address 10.0.0.14/30


set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/1 unit 0 family inet address 10.0.0.22/30
set interfaces so-1/2/1 unit 0 family iso
set interfaces so-1/2/2 unit 0 family inet address 10.0.0.26/30
set interfaces so-1/2/2 unit 0 family iso
set interfaces so-1/2/3 unit 0 family iso
set interfaces so-1/2/3 unit 0 family inet6 address 2001:db8:0:3::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.5/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::5/128

Copyright 2015, Juniper Networks, Inc.

153

IS-IS Feature Guide for Routing Devices

set protocols isis topologies ipv6-unicast


set protocols isis interface so-1/2/0.0 no-ipv6-unicast
set protocols isis interface so-1/2/1.0 no-ipv6-unicast
set protocols isis interface so-1/2/2.0 no-ipv6-unicast
set protocols isis interface so-1/2/3.0
set protocols isis interface lo0.0

Device R6

Step-by-Step
Procedure

set interfaces so-1/2/0 unit 0 family inet address 10.0.0.6/30


set interfaces so-1/2/0 unit 0 family iso
set interfaces so-1/2/0 unit 0 family inet6 address 2001:db8:0:2::/64 eui-64
set interfaces so-1/2/1 unit 0 family iso
set interfaces so-1/2/1 unit 0 family inet6 address 2001:db8:0:3::/64 eui-64
set interfaces lo0 unit 0 family inet address 192.168.0.6/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0006.00
set interfaces lo0 unit 0 family inet6 address 2001:db8::6/128
set protocols isis topologies ipv6-unicast
set protocols isis interface so-1/2/0.0
set protocols isis interface so-1/2/1.0
set protocols isis interface lo0.0

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure an alternate IPv6 unicast topology:
1.

Configure the interfaces.


[edit interfaces]
user@R1# set so-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set so-1/2/0 unit 0 family iso
user@R1# set so-1/2/0 unit 0 family inet6 address 2001:db8:0:5::/64 eui-64
user@R1# set so-1/2/1 unit 0 family inet address 10.0.0.13/30
user@R1# set so-1/2/1 unit 0 family iso
user@R1# set so-1/2/2 unit 0 family inet address 10.0.0.17/30
user@R1# set so-1/2/2 unit 0 family iso
user@R1# set so-1/2/2 unit 0 family inet6 address 2001:db8:0:1::/64 eui-64
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
user@R1# set lo0 unit 0 family inet6 address 2001:db8::1/128

2.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@R1# set interface so-1/2/0.0
user@R1# set interface so-1/2/1.0
user@R1# set interface so-1/2/2.0
user@R1# set interface lo0.0

3.

Enable multitopology routing on the IS-IS interfaces.


The ipv6-unicast statement enables multitopology IS-IS routing on all interfaces
that have family iso and family inet6 configured and are listed at the [edit protocols
isis interface] hierarchy level.
[edit protocols isis]
user@R1# set topologies ipv6-unicast

154

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

4.

Disable IPv6 unicast support on a given interface.


If you do not want to run multitopology IS-IS routing for IPv6 on a given interface,
you can disable multitopology routing by including the no-ipv6-unicast statement
in the IS-IS interface configuration.
[edit protocols isis]
user@R1# set interface so-1/2/1.0 no-ipv6-unicast

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show interfaces
so-1/2/0 {
unit 0 {
family inet {
address 10.0.0.1/30;
}
family iso;
family inet6 {
address 2001:db8:0:5::/64 {
eui-64;
}
}
}
}
so-1/2/1 {
unit 0 {
family inet {
address 10.0.0.13/30;
}
family iso;
}
}
so-1/2/2 {
unit 0 {
family inet {
address 10.0.0.17/30;
}
family iso;
family inet6 {
address 2001:db8:0:1::/64 {
eui-64;
}
}
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;

Copyright 2015, Juniper Networks, Inc.

155

IS-IS Feature Guide for Routing Devices

}
family inet6 {
address 2001:db8::1/128;
}
}
}
user@R1# show protocols
isis {
topologies ipv6-unicast;
interface so-1/2/0.0;
interface so-1/2/1.0 {
no-ipv6-unicast;
}
interface so-1/2/2.0;
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Checking the Topologies on Neighbors on page 156

Checking the IS-IS SPF Calculations on page 157

Checking the Tcpdump Output on page 158

Checking the Topologies on Neighbors


Purpose

Determine what topologies are supported on neighboring IS-IS devices.

Action

From operational mode, enter the show isis adjacency detail command.
user@R1> show isis adjacency detail
R2
Interface: so-1/2/0.0, Level: 3, State: Up, Expires in 24 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:28:16 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast, IPV6-Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.2
IPv6 addresses: fe80::2a0:a514:0:24c
R5
Interface: so-1/2/1.0, Level: 3, State: Up, Expires in 21 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:27:47 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.14
R3
Interface: so-1/2/2.0, Level: 3, State: Up, Expires in 22 secs
Priority: 0, Up/Down transitions: 1, Last transition: 05:27:25 ago
Circuit type: 3, Speaks: IP, IPv6

156

Copyright 2015, Juniper Networks, Inc.

Chapter 6: Configuring IS-IS Multitopology Routing and IPv6 Support

Topologies: Unicast, IPV6-Unicast


Restart capable: Yes, Adjacency advertisement: Advertise
IP addresses: 10.0.0.18
IPv6 addresses: fe80::2a0:a514:0:124c

Meaning

As expected, the adjacency with Device R5 only supports the IPv4 unicast topology, while
the adjacencies with Device R2 and Device R3 support both the IPv4 and IPv6 topologies.

Checking the IS-IS SPF Calculations


Purpose
Action

Verify that separate SPF calculations are being run for IPv4 and IPv6.
From operational mode, enter the show isis spf brief command.
user@R1> show isis spf brief
IPV4 Unicast IS-IS level 1 SPF results:
Node
Metric
Interface
NH
R6.00
20
so-1/2/1.0
IPV4 R5
R4.00
20
so-1/2/0.0
IPV4 R2
R5.00
10
so-1/2/1.0
IPV4 R5
R3.00
10
so-1/2/2.0
IPV4 R3
R2.00
10
so-1/2/0.0
IPV4 R2
R1.00
0
6 nodes

Meaning

IPV4 Unicast
Node
R6.00
R4.00
R5.00
R3.00
R2.00
R1.00
6 nodes

IS-IS level 2 SPF results:


Metric
Interface
NH
20
so-1/2/1.0
IPV4 R5
20
so-1/2/0.0
IPV4 R2
10
so-1/2/1.0
IPV4 R5
10
so-1/2/2.0
IPV4 R3
10
so-1/2/0.0
IPV4 R2
0

IPV6 Unicast
Node
R5.00
R6.00
R4.00
R3.00
R2.00
R1.00
6 nodes

IS-IS level 1 SPF results:


Metric
Interface
NH
40
so-1/2/0.0
IPV6 R2
30
so-1/2/0.0
IPV6 R2
20
so-1/2/0.0
IPV6 R2
10
so-1/2/2.0
IPV6 R3
10
so-1/2/0.0
IPV6 R2
0

IPV6 Unicast
Node
R5.00
R6.00
R4.00
R3.00
R2.00
R1.00
6 nodes

IS-IS level 2 SPF results:


Metric
Interface
NH
40
so-1/2/0.0
IPV6 R2
30
so-1/2/0.0
IPV6 R2
20
so-1/2/0.0
IPV6 R2
10
so-1/2/2.0
IPV6 R3
10
so-1/2/0.0
IPV6 R2
0

Via

SNPA

Via

SNPA

Via

SNPA

Via

SNPA

As expected, SPF calculations are being performed for IPv4 and IPv6 topologies.

Copyright 2015, Juniper Networks, Inc.

157

IS-IS Feature Guide for Routing Devices

Checking the Tcpdump Output


Purpose

Action

Verify that the link can be a member of both the IPv4 unicast topology and the IPv6
unicast topology.

user@R1> monitor traffic detail interface so-1/2/0.0


[...]
15:52:35.719540 In IS-IS, length 82
p2p IIH, hlen: 20, v: 1, pdu-v: 1, sys-id-len: 6 (0), max-area: 3 (0)
source-id: 0192.0168.0002, holding time: 27s, Flags: [Level 1, Level
2]
circuit-id: 0x01, PDU length: 82
Point-to-point Adjacency State TLV #240, length: 15
Adjacency State: Up (0)
Extended Local circuit-ID: 0x00000054
Neighbor System-ID: 0192.0168.0001
Neighbor Extended Local circuit-ID: 0x00000043
Protocols supported TLV #129, length: 2
NLPID(s): IPv4 (0xcc), IPv6 (0x8e)
IPv4 Interface address(es) TLV #132, length: 4
IPv4 interface address: 10.0.0.2
IPv6 Interface address(es) TLV #232, length: 16
IPv6 interface address: fe80::2a0:a514:0:24c
Area address(es) TLV #1, length: 4
Area address (length: 3): 49.0002
Restart Signaling TLV #211, length: 3
Flags [none], Remaining holding time 0s
Multi Topology TLV #229, length: 4
IPv4 unicast Topology (0x000), Flags: [none]
IPv6 unicast Topology (0x002), Flags: [none]

Meaning

Related
Documentation

158

The IS-IS hello (IIH) packet shows that IPv4 and IPv6 are supported. The hello packet
lists valid IPv4 and IPv6 addresses, and therefore the routing device can create valid
next-hop entries. The supported protocols are listed in the multitopology TLV #229.

Example: Configuring IS-IS Dual Stacking of IPv4 and IPv6 Unicast Addresses on
page 144

Copyright 2015, Juniper Networks, Inc.

CHAPTER 7

Configuring IS-IS Link and Node Link


Protection

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

Understanding Remote LFA over LDP Tunnels in IS-IS Networks on page 174

Configuring Remote LFA Backup over LDP Tunnels in an IS-IS Network on page 175

Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks on page 177

Understanding Loop-Free Alternate Routes for IS-IS


In Junos OS Release 9.5 and later, support for IS-IS loop-free alternate routes enables
IP fast-reroute capability for IS-IS. Junos OS precomputes loop-free backup routes for
all IS-IS routes. These backup routes are preinstalled in the Packet Forwarding Engine,
which performs a local repair and implements the backup path when the link for a primary
next hop for a particular route is no longer available. With local repair, the Packet
Forwarding Engine can correct a path failure before it receives recomputed paths from
the Routing Engine. Local repair reduces the amount of time needed to reroute traffic to
less than 50 milliseconds. In contrast, global repair can take up to 800 milliseconds to
compute a new route. Local repair and global repair are thus complementary. Local repair
enables traffic to continue to be routed using a backup path until global repair is able to
calculate a new route.
A loop-free path is one that does not forward traffic back through the routing device to
reach a given destination. That is, a neighbor whose shortest path to the destination
traverses the routing device is not used as a backup route to that destination. To determine
loop-free alternate paths for IS-IS routes, Junos OS runs shortest-path-first (SPF)
calculations on each one-hop neighbor. You can enable support for alternate loop-free
routes on any IS-IS interface. Because it is common practice to enable LDP on an interface
for which IS-IS is already enabled, this feature also provides support for LDP
label-switched paths (LSPs).

NOTE: If you enable support for alternate loop-free routes on an interface


configured for both LDP and IS-IS, you can use the traceroute command to
trace the active path to the primary next hop.

Copyright 2015, Juniper Networks, Inc.

159

IS-IS Feature Guide for Routing Devices

The level of backup coverage available through IS-IS routes depends on the actual
network topology and is typically less than 100 percent for all destinations on any given
routing device. You can extend backup coverage to include RSVP LSPs.
Junos OS provides two mechanisms for route redundancy for IS-IS through alternate
loop-free routes: link protection and node-link protection. When you enable link protection
or node-link protection on an IS-IS interface, Junos OS creates a single alternate path to
the primary next hop for all destination routes that traverse a protected interface. Link
protection offers per-link traffic protection. Use link protection when you assume that
only a single link might become unavailable but that the neighboring node on the primary
path would still be available through another interface.
Node-link protection establishes an alternate path through a different routing device
altogether. Use node-link protection when you assume that access to a node is lost when
a link is no longer available. As a result, Junos OS calculates a backup path that avoids
the primary next-hop routing device. In Junos OS Release 9.4 and earlier, only the RSVP
protocol supports Packet Forwarding Engine local repair and fast reroute as well as link
protection and node protection.
In Figure 16 on page 161, Case 2 shows how link protection allows source Router A to
switch to Link B when the primary next hop Link A to destination Router C fails. However,
if Router B fails, Link B also fails, and the protected Link A is lost. If node-link protection
is enabled, Router A is able to switch to Link D on Router D and bypass the failed Router
B altogether. As shown in Case 1, with node-link protection enabled, Router A has a
node-link protection alternate path available through Router D to destination Router C.
That means that if Router B fails, Router A can still reach Router C because the path from
Router A to Link D remains available as an alternate backup path.

160

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

Figure 16: Link Protection and Node-Link Protection Comparison for IS-IS
Routes

The Junos OS implementation of support for loop-free alternate paths for IS-IS routes
is based on the following standards:

RFC 5286, Basic Specification for IP Fast-Reroute: Loop-free Alternates

RFC 5714, IP Fast Reroute Framework

Configuring Link Protection for IS-IS


You can configure link protection on any interface for which IS-IS is enabled. When you
enable link protection, Junos OS creates one alternate path to the primary next hop for
all destination routes that traverse a protected interface. Link protection assumes that
only a single link becomes unavailable but that the neighboring node would still be
available through another interface.

NOTE: You must also configure a per-packet load-balancing routing policy


to ensure that the routing protocol process installs all the next hops for a
given route in the routing table.

To enable link protection, include the link-protection statement at the [edit protocols isis
interface interface-name] hierarchy level:
[edit]
protocols {
isis {
interface interface-name {

Copyright 2015, Juniper Networks, Inc.

161

IS-IS Feature Guide for Routing Devices

link-protection;
}
}
}

Configuring Node-Link Protection for IS-IS


You can configure node-link protection on any interface for which IS-IS is enabled.
Node-link protection establishes an alternate path through a different routing device
altogether for all destination routes that traverse a protected interface. Node-link
protection assumes that the entire routing device, or node, has failed. Junos OS therefore
calculates a backup path that avoids the primary next-hop routing device.

NOTE: You must also configure a per-packet load-balancing routing policy


to ensure that the routing protocol process installs all the next hops for a
given route in the routing table.

To enable node-link protection, include the node-link-protection statement at the [edit


protocols isis interface interface-name] hierarchy level:
[edit]
protocols {
isis {
interface interface-name {
node-link-protection;
}
}
}

Excluding an IS-IS Interface as a Backup for Protected Interfaces


By default, all IS-IS interfaces that belong to the master instance or a specific routing
instance are eligible as backup interfaces for protected interfaces. You can specify that
any IS-IS interface be excluded from functioning as a backup interface to protected
interfaces. To exclude an IS-IS interface as a backup interface, include the
no-eligible-backup statement at the [edit protocols isis interface interface-name] hierarchy
level:
[edit]
protocols {
isis {
interface interface-name {
no-eligible-backup;
}
}
}

Configuring RSVP Label-Switched Paths as Backup Paths for IS-IS


Relying on the shortest-path-first (SPF) calculation of backup paths for one-hop
neighbors might result in less than 100 percent backup coverage for a specific network
topology. You can enhance coverage of IS-IS and LDP label-switched paths (LSPs) by

162

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

configuring RSVP LSPs as backup paths. To configure a specific RSVP LSP as a backup
path, include the backup statement at the [edit protocols mpls label-switched-path
lsp-name] hierarchy level:
[edit]
protocols {
mpls {
label-switched-path lsp-name {
backup;
to ip-address;
}
}
}

When configuring an LSP, you must specify the IP address of the egress routing device
with the to statement. For detailed information about configuring LSPs and RSVP, see
the Junos OS MPLS Applications Library for Routing Devices.

Using Operational Mode Commands to Monitor Protected IS-IS Routes


You can issue operational mode commands that provide more details about your
link-protected and node-link-protected IS-IS routes. The following guidelines explain
the type of information available from the output of each command:

show isis backup label-switched-pathDisplays which MPLS LSPs have been designated

as backup paths and the current status of those LSPs.

show isis backup spf resultsDisplays SPF calculations for each neighbor for a given

destination. Indicates whether a specific interface or node has been designated as a


backup path and why. Use the no-coverage option to display only those nodes that do
not have backup coverage.

show isis backup coverageDisplays the percentage of nodes and prefixes for each

type of address family that is protected.

show isis interface detailDisplays the type of protection (link or node-link) applied

to each protected interface.


Related
Documentation

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN


Node-link protection establishes an alternate path through a different routing device.
Use node-link protection when you assume that access to a node is lost when a link is
no longer available. Junos OS calculates a backup path that avoids the primary next-hop
routing device.

Requirements on page 164

Overview on page 164

Configuration on page 164

Verification on page 171

Copyright 2015, Juniper Networks, Inc.

163

IS-IS Feature Guide for Routing Devices

Requirements
This example requires Junos OS Release 9.5 or later.
No special configuration beyond device initialization is required before configuring this
example.

Overview
In this example, core-facing interfaces are enabled for IS-IS Level 2, LDP, and RSVP.
Node-link protection is enabled on all the core-facing interfaces, which means that if the
primary next hop for any destination that traverses the interfaces becomes unavailable,
Junos OS uses a backup link that avoids the next-hop router altogether if necessary.
You also need to configure a routing policy that requires all traffic to use per-packet load
balancing in order to enable Packet Forwarding Engine local repair. With local repair, the
Packet Forwarding Engine can correct a path failure and implement a backup loop-free
alternate route before it receives recomputed paths from the Routing Engine.
Figure 17 on page 164 shows the topology used in this example.

Figure 17: IS-IS Node-Link Protection Topology

CE1

.1

10.0.0.0/30
.2

PE1

10.0.0.4/30
.5
.6
.21

P1

10.0.0.8/30
.9
.10
.25

P2

10.0.0.12/30
.13
.14

PE2
.29 .17

lo0,0 Addresses
10.255.1.1
10.255.2.2
10.255.3.3
10.255.4.4
10.255.7.7
10.255.5.5
10.255.6.6

10.0.0.24/30
10.0.0.16/30
.18

.26
10.0.0.20/30

.22

P3

.30
10.0.0.28/30

CE2
g041275

CE1
PE1
P1
P2
P3
PE2
CE2

On Device PE1, an RSVP LSP is configured as a backup path for IS-IS. Relying on the
shortest-path-first (SPF) calculation of backup paths for one-hop neighbors might result
in less than 100 percent backup coverage for a specific network topology. You can enhance
coverage of IS-IS and LDP LSPs by configuring RSVP LSPs as backup paths. To configure
a specific RSVP LSP as a backup path, include the backup statement at the [edit protocols
mpls label-switched-path lsp-name] hierarchy level.
CLI Quick Configuration on page 164 shows the configuration for all of the devices in
Figure 17 on page 164. The section Step-by-Step Procedure on page 168 describes the
steps on Device P1.

Configuration
CLI Quick
Configuration

164

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

Device CE1

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30


set interfaces lo0 unit 0 family inet address 10.255.1.1/32

Device PE1

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.2.2/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0202.00
set protocols rsvp interface fe-1/2/2.0
set protocols rsvp interface fe-1/2/1.0
set protocols rsvp interface lo0.0
set protocols rsvp interface fxp0.0 disable
set protocols mpls label-switched-path to-p2 backup
set protocols mpls label-switched-path to-p2 to 10.255.4.4
set protocols mpls label-switched-path to-p2 ldp-tunneling
set protocols mpls interface fe-1/2/2.0
set protocols mpls interface fe-1/2/1.0
set protocols mpls interface lo0.0
set protocols mpls interface fxp0.0 disable
set protocols bgp group l3vpn type internal
set protocols bgp group l3vpn local-address 10.255.2.2
set protocols bgp group l3vpn family inet-vpn unicast
set protocols bgp group l3vpn peer-as 65534
set protocols bgp group l3vpn local-as 65534
set protocols bgp group l3vpn neighbor 10.255.5.5
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface fe-1/2/1.0
set protocols ldp interface fe-1/2/2.0
set protocols ldp interface fxp0.0 disable
set protocols ldp interface lo0.0
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-instances VPN-A instance-type vrf
set routing-instances VPN-A interface fe-1/2/0.0
set routing-instances VPN-A route-distinguisher 65534:1234
set routing-instances VPN-A vrf-target target:65534:1234
set routing-instances VPN-A routing-options static route 10.255.1.1/32 next-hop 10.0.0.1
set routing-options autonomous-system 65534
set routing-options forwarding-table export ecmp

Device P1

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.6/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.9/30

Copyright 2015, Juniper Networks, Inc.

165

IS-IS Feature Guide for Routing Devices

set interfaces fe-1/2/1 unit 0 family iso


set interfaces fe-1/2/1 unit 0 family mpls
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.25/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.3.3/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0303.00
set protocols rsvp interface all
set protocols rsvp interface fxp0.0 disable
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-options forwarding-table export ecmp

166

Device P2

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.10/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.4.4/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0404.00
set protocols rsvp interface all
set protocols rsvp interface fxp0.0 disable
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-options forwarding-table export ecmp

Device P3

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.22/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.26/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.30/30
set interfaces fe-1/2/2 unit 0 family iso

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

set interfaces fe-1/2/2 unit 0 family mpls


set interfaces lo0 unit 0 family inet address 10.255.7.7/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0707.00
set protocols rsvp interface all
set protocols rsvp interface fxp0.0 disable
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-options forwarding-table export ecmp

Device PE2

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.14/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.29/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 10.255.5.5/32
set interfaces lo0 unit 0 family iso address 49.0001.0010.0000.0505.00
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/2.0
set protocols rsvp interface lo0.0
set protocols rsvp interface fxp0.0 disable
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/2.0
set protocols mpls interface lo0.0
set protocols mpls interface fxp0.0 disable
set protocols bgp group l3vpn type internal
set protocols bgp group l3vpn local-address 10.255.5.5
set protocols bgp group l3vpn family inet-vpn unicast
set protocols bgp group l3vpn peer-as 65534
set protocols bgp group l3vpn local-as 65534
set protocols bgp group l3vpn neighbor 10.255.2.2
set protocols isis spf-options delay 1000
set protocols isis interface all node-link-protection
set protocols isis interface all level 2 metric 10
set protocols isis interface all level 1 disable
set protocols isis interface fxp0.0 disable
set protocols isis interface lo0.0 level 2 metric 0
set protocols ldp deaggregate
set protocols ldp interface fe-1/2/0.0
set protocols ldp interface fe-1/2/2.0
set protocols ldp interface fxp0.0 disable
set protocols ldp interface lo0.0
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-instances VPN-A instance-type vrf

Copyright 2015, Juniper Networks, Inc.

167

IS-IS Feature Guide for Routing Devices

set routing-instances VPN-A interface fe-1/2/1.0


set routing-instances VPN-A route-distinguisher 65534:1234
set routing-instances VPN-A vrf-target target:65534:1234
set routing-instances VPN-A routing-options static route 10.255.1.1/32 next-hop 10.0.0.18
set routing-options autonomous-system 65534
set routing-options forwarding-table export ecmp

Device CE2

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30


set interfaces lo0 unit 0 family inet address 10.255.6.6/32

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure multi-level IS-IS:
1.

Configure the interfaces.


Enable IS-IS and MPLS.
[edit interfaces]
user@P1# set fe-1/2/0 unit 0 family inet address 10.0.0.6/30
user@P1# set fe-1/2/0 unit 0 family iso
user@P1# set fe-1/2/0 unit 0 family mpls
user@P1# set fe-1/2/1 unit 0 family inet address 10.0.0.9/30
user@P1# set fe-1/2/1 unit 0 family iso
user@P1# set fe-1/2/1 unit 0 family mpls
user@P1# set fe-1/2/2 unit 0 family inet address 10.0.0.25/30
user@P1# set fe-1/2/2 unit 0 family iso
user@P1# set fe-1/2/2 unit 0 family mpls
user@P1# set lo0 unit 0 family inet address 10.255.3.3/32
user@P1# set lo0 unit 0 family iso address 49.0001.0010.0000.0303.00

2.

Configure the IS-IS interfaces for Level 2.


[edit protocols]
user@P1# set isis interface all level 2 metric 10
user@P1# set isis interface all level 1 disable
user@P1# set isis interface fxp0.0 disable
user@P1# set isis interface lo0.0 level 2 metric 0

3.

Enable IS-IS node-link protection, which also automatically extends backup coverage
to all LDP LSPs.
[edit protocols]
user@P1# set isis interface all node-link-protection

4.

(Optional) Configure a 1000-millisecond time interval between the detection of a


topology change and when the SPF algorithm runs.
[edit protocols]
user@P1# set isis spf-options delay 1000

5.

Configure MPLS to use both RSVP and LDP label-switched paths (LSPs).
[edit protocols]
user@P1# set mpls interface all
user@P1# set mpls interface fxp0.0 disable
user@P1# set rsvp interface all

168

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

user@P1# set rsvp interface fxp0.0 disable


user@P1# set ldp interface all
user@P1# set ldp interface fxp0.0 disable
6.

(Optional) For LDP, enable forwarding equivalence class (FEC) deaggregation,


which results in faster global convergence.
[edit protocols]
user@P1# set ldp deaggregate

7.

To enable Packet Forwarding Engine local repair, establish a policy that forces the
routing protocol process to install all the next hops for a given route.
This policy ensures that the backup route is installed in the forwarding table used
by the Packet Forwarding Engine to forward traffic to a given destination.
[edit policy-options policy-statement ecmp term 1]
user@P1# set then load-balance per-packet

8.

Apply the policy to the forwarding table of the local router with the export statement.
[edit routing-options forwarding-table]
user@P1# set export ecmp

Results

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
user@P1# show interfaces
fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.6/30;
}
family iso;
family mpls;
}
}
fe-1/2/1 {
unit 0 {
family inet {
address 10.0.0.9/30;
}
family iso;
family mpls;
}
}
fe-1/2/2 {
unit 0 {
family inet {
address 10.0.0.25/30;
}
family iso;
family mpls;
}
}

Copyright 2015, Juniper Networks, Inc.

169

IS-IS Feature Guide for Routing Devices

lo0 {
unit 0 {
family inet {
address 10.255.3.3/32;
}
family iso {
address 49.0001.0010.0000.0303.00;
}
}
}
user@P1# show protocols
rsvp {
interface all;
interface fxp0.0 {
disable;
}
}
mpls {
interface all;
interface fxp0.0 {
disable;
}
}
isis {
spf-options delay 1000;
interface all {
node-link-protection;
level 2 metric 10;
level 1 disable;
}
interface fxp0.0 {
disable;
}
interface lo0.0 {
level 2 metric 0;
}
}
ldp {
deaggregate;
interface all;
interface fxp0.0 {
disable;
}
}
user@P1# show policy-options
policy-statement ecmp {
term 1 {
then {
load-balance per-packet;
}
}
}
user@P1# show routing-options
forwarding-table {

170

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

export ecmp;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Checking the MPLS LSP Backup Path on page 171

Checking Which Next-Hop Neighbors Are Designated as Backup Paths to the Destination
Node on page 171

Checking the Backup Coverage on page 172

Checking the Type of Protection Configured on page 173

Checking the MPLS LSP Backup Path


Purpose

Action

Display information about the MPLS label-switched-paths (LSPs) designated as the


backup route for the IS-IS routes.
On Device PE1, from operational mode, enter the show isis backup label-switched-path
command.
user@PE1> show isis backup label-switched-path
Backup MPLS LSPs:
to-p2, Egress: 10.255.4.4, Status: up, Last change: 01:17:45
TE-metric: 19, Metric: 0, Refcount: 1

Meaning

The output shows that the backup path is up and operational.

Checking Which Next-Hop Neighbors Are Designated as Backup Paths to the


Destination Node
Purpose
Action

Display SPF calculations for each neighbor for a given destination.


On Device PE1, from operational mode, enter the show isis backup spf results command.
user@PE1> show isis backup spf results
IS-IS level 1 SPF results:
0 nodes
IS-IS level 2 SPF results:
PE2.00
Primary next-hop: fe-1/2/2.0, IPV4, P3, SNPA: 0:5:85:8f:c8:bd
Root: P2, Root Metric: 20, Metric: 10, Root Preference: 0x0
track-item: P2.00-00
Eligible, Backup next-hop: fe-1/2/1.0, LSP, to-p2
Root: P3, Root Metric: 10, Metric: 10, Root Preference: 0x0
Not eligible, Reason: Interface is already covered
Root: P1, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: P3.00-00
Not eligible, Reason: Interface is already covered
P2.00
Primary next-hop: fe-1/2/1.0, IPV4, P1, SNPA: 0:5:85:8f:c8:bd

Copyright 2015, Juniper Networks, Inc.

171

IS-IS Feature Guide for Routing Devices

Root: P2, Root Metric: 20, Metric: 0, Root Preference: 0x0


track-item: P2.00-00
Not eligible, Reason: Primary next-hop link fate sharing
Root: P1, Root Metric: 10, Metric: 10, Root Preference: 0x0
Not eligible, Reason: Primary next-hop link fate sharing
Root: P3, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: P1.00-00
Not eligible, Reason: Primary next-hop node fate sharing
P3.00
Primary next-hop: fe-1/2/2.0, IPV4, P3, SNPA: 0:5:85:8f:c8:bd
Root: P2, Root Metric: 20, Metric: 20, Root Preference: 0x0
track-item: P3.00-00
track-item: P2.00-00
track-item: P1.00-00
Eligible, Backup next-hop: fe-1/2/1.0, LSP, to-p2
Root: P3, Root Metric: 10, Metric: 0, Root Preference: 0x0
Not eligible, Reason: Interface is already covered
Root: P1, Root Metric: 10, Metric: 10, Root Preference: 0x0
track-item: P3.00-00
Not eligible, Reason: Interface is already covered
P1.00
Primary next-hop: fe-1/2/1.0, IPV4, P1, SNPA: 0:5:85:8f:c8:bd
Root: P2, Root Metric: 20, Metric: 10, Root Preference: 0x0
track-item: P2.00-00
track-item: P1.00-00
Not eligible, Reason: Primary next-hop link fate sharing
Root: P1, Root Metric: 10, Metric: 0, Root Preference: 0x0
Not eligible, Reason: Primary next-hop link fate sharing
Root: P3, Root Metric: 10, Metric: 10, Root Preference: 0x0
track-item: P1.00-00
Eligible, Backup next-hop: fe-1/2/2.0, IPV4, P3, SNPA: 0:5:85:8f:c8:bd
4 nodes

Meaning

The output indicates whether a specific interface or node has been designated as a
backup path and why.

Checking the Backup Coverage


Purpose
Action

172

Check the percentage of protected nodes and prefixes.


From operational mode, enter the show isis backup coverage command.
user@PE1> show isis backup coverage
Backup Coverage:
Topology
Level
Node
IPv4
IPV4 Unicast
1
0.00%
0.00%
IPV4 Unicast
2 75.00% 87.50%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

user@P1> show isis backup coverage


Backup Coverage:
Topology
Level
Node
IPv4
IPV4 Unicast
1
0.00%
0.00%
IPV4 Unicast
2 75.00% 71.43%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

user@P2> show isis backup coverage


Backup Coverage:
Topology
Level
Node
IPv4
IPV4 Unicast
1
0.00%
0.00%
IPV4 Unicast
2 50.00% 37.50%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

Meaning

user@P3> show isis backup coverage


Backup Coverage:
Topology
Level
Node
IPv4
IPV4 Unicast
1
0.00%
0.00%
IPV4 Unicast
2 75.00% 71.43%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

user@PE2> show isis backup coverage


Backup Coverage:
Topology
Level
Node
IPv4
IPV4 Unicast
1
0.00%
0.00%
IPV4 Unicast
2 50.00% 37.50%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

The level of backup coverage available through IS-IS routes depends on the actual
network topology and is typically less than 100 percent for all destinations on any given
routing device. You can extend backup coverage to include RSVP LSPs.

Checking the Type of Protection Configured


Purpose

Action

On all nodes in the IS-IS domain, check the type and percentage of protected nodes and
prefixes.
From operational mode, enter the show isis interface detail command.
user@PE1> show isis interface detail
IS-IS interface database:
lo0.0
Index: 76, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated
1
0
64
0 Passive
2
0
64
0 Passive
fe-1/2/2.0
Index: 79, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Protection Type: Node Link
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated
2
1
64
10
9.000
27 P3.03 (not
fe-1/2/1.0
Index: 77, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 10 s
Adjacency advertisement: Advertise
Protection Type: Node Link
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated
2
1
64
10
9.000
27 P1.02 (not

Meaning

Related
Documentation

Router

Router
us)

Router
us)

The output shows that node-link protection is configured on the interfaces.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Copyright 2015, Juniper Networks, Inc.

173

IS-IS Feature Guide for Routing Devices

Understanding Remote LFA over LDP Tunnels in IS-IS Networks


In an IS-IS network, a loop free alternate (LFA) is a directly connected neighbor that
provides precomputed backup paths to the destinations reachable via the protected link
on the point of local repair (PLR). A remote LFA is not directly connected to the PLR and
provides precomputed backup paths using dynamically created LDP tunnels to the
remote LFA node. The PLR uses this remote LFA backup path when the primary link fails.
The primary goal of the remote LFA is to increase backup coverage for the IS-IS networks
and provide protection for Layer 1 metro-rings.
LFAs do not provide full backup coverage for IS-IS networks. This is a major setback for
metro Ethernet networks that are often shaped as ring topologies. To overcome this
setback, Resource Reservation Protocol - Traffic Engineering (RSVP-TE) backup tunnels
are commonly used to extend the backup coverage. However, a majority of network
providers have already implemented LDP as the MPLS tunnel setup protocol and do not
want to implement the RSVP-TE protocol merely for backup coverage. LDP automatically
brings up transport tunnels to all potential destinations in an IS-IS network and hence is
the preferred protocol. The existing LDP implemented for the MPLS tunnel setup can be
reused for protection of IS-IS networks and subsequent LDP destinations, thereby
eliminating the need for RSVP-TE backup tunnels for backup coverage.
To calculate the remote LFA backup path, the IS-IS protocol determines the remote LFA
node in the following manner:
1.

Calculates the reverse shortest path first from the adjacent router across the protected
link of a PLR. The reverse shortest path first uses the incoming link metric instead of
the outgoing link metric to reach a neighboring node.
The result is a set of links and nodes, which is the shortest path from each leaf node
to the root node.

2. Calculates the shortest path first (SPF) on the remaining adjacent routers to find the

list of nodes that can be reached without traversing the link being protected.
The result is another set of links and nodes on the shortest path from the root node
to all leaf nodes.
3. Determines the common nodes from the above results, These nodes are the remote

LFAs.
IS-IS listens to the advertised labels for the LDP routes. For each advertised LDP route,
IS-IS checks if it contains an LDP supplied next hop. If the corresponding IS-IS route does
have a backup next hop, then IS-IS runs the backup policy and adds an additional tracking
route with the corresponding LDP label-switched path next hop as the backup next hop.
If there are no backup next hops, LDP builds a dynamic LDP tunnel to the remote LFA,
and LDP establishes a targeted adjacency between the remote LFA node and the PLR
node. This backup route has two LDP labels. The top label is the IS-IS route, which denotes
the backup path from the PLR to the remote LFA route. The bottom label is the LDP
MPLS label-switched path that denotes the route for reaching the ultimate destination
from the remote LFA. When an LDP session goes down and a remote tunnel is no longer
available, IS-IS changes all the routes that have been using this backup LDP tunnel.

174

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

NOTE: Currently, Junos OS supports only IPv4 transport LSPs. If you need to
reuse IPv4 transport LSPs for IPv6 IGP networks, add an IPv6 explicit NULL
label to the label stack of the tracking route. The system automatically
converts the IPv4 LSP to an IPv6 LSP.

LDP might be vulnerable by an automatically targeted adjacency, and these threats can
be mitigated using all or some of the following mechanisms:

Related
Documentation

Remote LFAs that are several hops away use extended hello messages to indicate
willingness to establish a targeted LDP session. A remote LFA can reduce the threat
of spoofed extended hellos by filtering them and accepting only those originating at
sources permitted by an access or filter list.

There is a need to TCP-MD5 authenticate all auto-targeted LDP sessions in the given
IGP/LDP domain using apply-groups or LDP global-level authentication.

As an added security measure, the repair or remote tunnel endpoint routers should be
assigned from a set of addresses that are not reachable from outside of the routing
domain.

auto-targeted-session

no-eligible-remote-backup on page 382

remote-backup-calculation on page 401

Configuring Remote LFA Backup over LDP Tunnels in an IS-IS Network on page 175

Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks on page 177

Configuring Remote LFA Backup over LDP Tunnels in an IS-IS Network


The primary goal of a remote loop-free alterate (LFA) is to increase backup coverage for
IS-IS routes and provide protection especially for Layer 1 metro-rings. The existing LDP
implemented for the MPLS tunnel setup can be reused for protection of IS-IS networks
and subsequent LDP destinations. The IS-IS protocol creates a dynamic LDP tunnel to
reach the remote LFA node from the point of local repair (PLR). The PLR uses this remote
LFA backup path when the primary link fails.
Before you configure remote LFA over LDP tunnels in an IS-IS network, you must do the
following:
1.

Enable LDP on the loopback interface.


Configure a loopback interface because an LDP targeted adjacency cannot be formed
without a loopback interface. LDP targeted adjacency is essential for determining
remote LFA backup paths.

2. Make sure that remote LFA allows asymmetric remote neighbor discovery, that is, it

must send periodic targeted hellos to the router that initiated the remote neighbor
for LDP auto-targeted adjacency.

Copyright 2015, Juniper Networks, Inc.

175

IS-IS Feature Guide for Routing Devices

3. Configure link protection or node-link protection on the PLR.

To configure remote LFA backup over LDP tunnels in an IS-IS network:


1.

Enable remote LFA backup to determine the backup next hop using dynamic LDP
label-switched path.
[edit protocols isis backup-spf-options]
user@host# set remote-backup-calculation

2. (Optional) Include the node-link-degradation statement even if node-link protection

is not configured for a given interface.


The device uses the configured link protection LFA as the backup for the primary link.
[edit protocols isis backup-spf-options]
user@host# set node-link-degradation
3. Enable automatically targeted LDP sessions using the loopback addresses between

the PLR and the remote LFA node.


[edit protocols ldp]
user@host# set auto-targeted-session
4. Specify a time interval for which the targeted LDP sessions are kept up even after the

remote LFA node goes down.


[edit protocols ldp auto-targeted-session]
user@host# set teardown-delay seconds

For example, to set a teardown delay value of 60 seconds:


[edit protocols ldp auto-targeted-session]
user@host# set teardown-delay 60
5. Specify maximum number of automatically targeted LDP sessions to optimize memory

usage.
[edit protocols ldp auto-targeted-session]
user@host# set maximum-sessions number of sessions

For example, to set a maximum sessions allowed to 20:


[edit protocols ldp auto-targeted-session]
user@host# set maximum-sessions 20

Related
Documentation

176

auto-targeted-session

remote-backup-calculation on page 401

no-eligible-remote-backup on page 382

Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

Example: Configuring Remote LFA over LDP Tunnels in IS-IS Networks


This example shows how to configure remote LFA for LDP tunnels in an IS-IS network
for extending backup protection.

Requirements on page 177

Overview on page 177

Configuration on page 178

Verification on page 185

Requirements
This example uses the following hardware and software components:

Six MX Series routers with IS-IS protocol and LDP enabled on the connected interfaces.

Junos OS Release 14.2 or later running on all devices.

Before you configure remote LFA over LDP tunnels in IS-IS networks, make sure of the
following:

LDP is enabled on the loopback interface. Without a loopback interface, LDP targeted
adjacency cannot be formed. Remote LFA cannot be configured without LDP targeted
adjacency.

Remote LFA must allow asymmetric remote neighbor discovery, that is, it must send
periodic targeted hellos to the router that initiated the remote neighbor for LDP auto
targeted adjacency.

Link protection or node-link protection must be configured on the point of local repair
(PLR).

Overview
The example includes six routers in a ring topology. Configure the IS-IS protocol on the
directly connected interfaces. Device R1 is the PLR. This example verifies that Junos OS
updates the routing table of Device R1 with LDP next-hop routes as the backup route.

Topology
Figure 18 on page 178 shows the topology used in this example.

Copyright 2015, Juniper Networks, Inc.

177

IS-IS Feature Guide for Routing Devices

Figure 18: Configuring Remote LFA over LDP Tunnels in IS-IS Networks

Configuration
CLI Quick
Configuration

Router R1

178

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, copy and paste the commands into the CLI at the [edit] hierarchy level,
and then enter commit from configuration mode.
set interfaces ge-1/0/0 unit 1 description R1->R2
set interfaces ge-1/0/0 unit 1 family inet address 1.1.1.1/24
set interfaces ge-1/0/0 unit 1 family iso
set interfaces ge-1/0/0 unit 1 family mpls
set interfaces ge-1/5/0 unit 12 description R1->R6
set interfaces ge-1/5/0 unit 12 family inet address 1.1.6.12/24
set interfaces ge-1/5/0 unit 12 family iso
set interfaces ge-1/5/0 unit 12 family mpls
set interfaces lo0 unit 10 family inet address 10.255.102.128/32
set interfaces lo0 unit 10 family iso address 49.0001.1720.1600.1010.00
set protocols isis interface ge-1/0/0.1
set protocols isis interface ge-1/5/0.12 link-protection
set protocols isis interface lo0.12 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

set protocols isis spf-options delay 1000


set protocols isis interface all node-link-protection
set protocols isis backup-spf-options remote-backup-calculation
set protocols isis backup-spf-options node-link-degradation
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set protocols ldp auto-targeted-session
set protocols ldp auto-targeted-session teardown-delay 60
set protocols ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate
set policy-options policy-statement ecmp term 1 then load-balance per-packet
set routing-options forwarding-table export ecmp

Router R2

set interfaces ge-1/0/1 unit 2 description R2>R1


set interfaces ge-1/0/1 unit 2 family inet address 1.1.1.2/24
set interfaces ge-1/0/1 unit 2 family iso
set interfaces ge-1/0/1 unit 2 family mpls
set interfaces ge-1/1/0 unit 3 description R2->R3
set interfaces ge-1/1/0 unit 3 family inet address 1.1.2.3/24
set interfaces ge-1/1/0 unit 3 family iso
set interfaces ge-1/1/0 unit 3 family mpls
set interfaces lo0 unit 3 family inet address 10.255.102.178/32
set interfaces lo0 unit 3 family iso address 49.0001.1720.1600.1030.00
set protocols isis interface ge-1/0/1.2
set protocols isis interface ge-1/1/0.3
set protocols isis interface lo0.3 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set protocols ldp auto-targeted-session
set protocols ldp auto-targeted-session teardown-delay 60
set protocols ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate

Router R3

set interfaces ge-1/1/1 unit 4 description R3->R2


set interfaces ge-1/1/1 unit 4 family inet address 1.1.2.4/24
set interfaces ge-1/1/1 unit 4 family iso
set interfaces ge-1/1/1 unit 4 family mpls
set interfaces ge-1/2/0 unit 5 description R3->R4
set interfaces ge-1/2/0 unit 5 family inet address 1.1.3.5/24
set interfaces ge-1/2/0 unit 5 family iso
set interfaces ge-1/2/0 unit 5 family mpls
set interfaces lo0 unit 5 family inet address 10.255.102.146/32
set interfaces lo0 unit 5 family iso address 49.0001.1720.1600.1050.00
set protocols isis interface ge-1/1/1.4
set protocols isis interface ge-1/2/0.5
set protocols isis interface lo0.5 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable

Copyright 2015, Juniper Networks, Inc.

179

IS-IS Feature Guide for Routing Devices

set protocols isis spf-options delay 1000


set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set protocols ldp auto-targeted-session
set protocols ldp auto-targeted-session teardown-delay 60
set protocols ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate

180

Router R4

set interfaces ge-1/2/1 unit 6 description R4->R3


set interfaces ge-1/2/1 unit 6 family inet address 1.1.3.6/24
set interfaces ge-1/2/1 unit 6 family iso
set interfaces ge-1/2/1 unit 6 family mpls
set interfaces ge-1/3/0 unit 7 description R4->R5
set interfaces ge-1/3/0 unit 7 family inet address 1.1.4.7/24
set interfaces ge-1/3/0 unit 7 family iso
set interfaces ge-1/3/0 unit 7 family mpls
set interfaces lo0 unit 7 family inet address 10.255.102.156/32
set interfaces lo0 unit 7 family iso address 49.0001.1720.1600.1070.00
set protocols isis interface ge-1/2/1.6
set protocols isis interface ge-1/3/0.7
set protocols isis interface lo0.7 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set protocols ldp auto-targeted-session
set protocols ldp auto-targeted-session teardown-delay 60
set protocols ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate

Router R5

set interfaces ge-1/3/1 unit 8 description R5->R4


set interfaces ge-1/3/1 unit 8 family inet address 1.1.4.8/24
set interfaces ge-1/3/1 unit 8 family iso
set interfaces ge-1/3/1 unit 8 family mpls
set interfaces ge-1/4/0 unit 9 description R5->R6
set interfaces ge-1/4/0 unit 9 family inet address 1.1.5.9/24
set interfaces ge-1/4/0 unit 9 family iso
set interfaces ge-1/4/0 unit 9 family mpls
set interfaces lo0 unit 90 family inet address 10.255.102.166/32
set interfaces lo0 unit 90 family iso address 49.0001.1720.1600.1090.00
set protocols isis interface ge-1/3/1.8
set protocols isis interface ge-1/4/0.9
set protocols isis interface lo0.9 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

set ldp auto-targeted-session


set ldp auto-targeted-session teardown-delay 60
set ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate

Router R6

set interfaces ge-1/4/1 unit 10 description R6->R5


set interfaces ge-1/4/1 unit 10 family inet address 1.1.5.10/24
set interfaces ge-1/4/1 unit 10 family iso
set interfaces ge-1/4/1 unit 10 family mpls
set interfaces ge-1/5/0 unit 11 description R6->R1
set interfaces ge-1/5/0 unit 11 family inet address 1.1.6.11/24
set interfaces ge-1/5/0 unit 11 family iso
set interfaces lo0 unit 110 family inet address 10.255.102.136/32
set interfaces ge-1/5/0 unit 11 family mpls
set interfaces lo0 unit 110 family iso address 49.0001.1720.1600.1110.00
set protocols isis interface ge-1/4/1.10
set protocols isis interface ge-1/5/0.11
set protocols isis interface lo0.11 passive
set protocols isis interface all level 2 metric 10
set protocols isis interface fxp0.0 disable
set protocols isis spf-options delay 1000
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable
set protocols ldp auto-targeted-session teardown-delay 60
set protocols ldp auto-targeted-session maximum-sessions 20
set protocols ldp deaggregate

Configuring Device R1
Step-by-Step
Procedure

The following example requires that you navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.

NOTE: Repeat this procedure except Step 4 and 5 for every Juniper Networks
router in the IGP domain, modifying the appropriate interface names,
addresses, and any other parameters.

To configure Device R1:


1.

Configure the interfaces.


[edit interfaces]
user@R1# set ge-1/0/0 unit 1 description R1->R2
user@R1# set ge-1/0/0 unit 1 family inet address 1.1.1.1/24
user@R1# set ge-1/0/0 unit 1 family iso
user@R1# set ge-1/0/0 unit 1 family mpls
user@R1# set ge-1/5/0 unit 12 description R1->R6
user@R1# set ge-1/5/0 unit 12 family inet address 1.1.6.12/24
user@R1# set ge-1/5/0 unit 12 family iso

Copyright 2015, Juniper Networks, Inc.

181

IS-IS Feature Guide for Routing Devices

user@R1# set ge-1/5/0 unit 12 family mpls


2.

Assign a loopback address to the device.


[edit interfaces lo0 unit 10]
user@R1# set family inet address 10.255.102.128/32
user@R1# set family iso address 49.0001.1720.1600.1010.00

3.

Configure the IS-IS interface for level 2 and the metric value on all the interfaces,
and enable link protection on the protected interface.
[edit protocols isis]
user@R1# set interface all level 2 metric 10
user@R1# set interface lo0.12 passive
user@R1# set interface fxp0.0 disable
user@R1# set interface ge-1/0/0.1
user@R1# set interface ge-1/5/0.12 link-protection

4.

Enable IS-IS node-link protection, which also automatically extends backup coverage
to all LDP label-switched paths.
[edit protocols isis]
user@R1# set spf-options delay 1000
user@R1# set interface all node-link-protection

5.

Enable remote LFA backup which calculates the backup next hop using dynamic
LDP label-switched path.
(Optional) When you include the node link degradation statement even if node
protection LFA is not configured for a given destination, the device uses the
configured link protection LFA as the backup for the primary link.
[edit protocols isis]
user@R1# set backup-spf-options remote-backup-calculation
user@R1# set backup-spf-options node-link-degradation

6.

Configure MPLS to use LDP label-switched paths for all interfaces on the device.
[edit protocols]
user@R1# set mpls interface all
user@R1# set mpls interface fxp0.0 disable
user@R1# set ldp interface all
user@R1# set ldp interface fxp0.0 disable

7.

Specify a time interval for which the targeted LDP sessions are kept up when the
remote LFA goes down, and specify a maximum number of automatically, targeted
LDP sessions to optimize the use of memory.
[edit protocols ldp]
user@R1# set auto-targeted-session
user@R1# set auto-targeted-session teardown-delay 60
user@R1# set auto-targeted-session maximum-sessions 20

8.

(Optional) Enable forwarding equivalence class (FEC) deaggregation, which results


in faster global convergence.
[edit protocols ldp]
user@R1# set deaggregate

182

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

To enable Packet Forwarding Engine local repair, establish a policy that forces the
routing protocol process to install all the next hops for a given route.

9.

This policy ensures that the backup route is installed in the forwarding table used
by the Packet Forwarding Engine to forward traffic to a given destination.
[edit policy-options]
user@R1# set policy-options policy-statement ecmp term 1
user@R1# set then load-balance per-packet
10.

Apply the policy to the forwarding table of the local router with the export statement.
[edit routing-options forwarding-table]
user@R1# set export ecmp

Results
From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, show policy-options, and show routing-options commands. If the
output does not display the intended configuration, repeat the instructions in this example
to correct the configuration.
user@R1# show interfaces
ge-1/0/0 {
unit 1 {
description R1->R2;
family inet {
address 1.1.1.1/24;
}
family iso;
family mpls;
}
}
ge-1/5/0 {
unit 12 {
description R1->R6;
family inet {
address 1.1.6.12/24;
}
family iso;
family mpls;
}
}
lo0 {
unit 10 {
family inet {
address 10.255.102.128/32;
}
family iso {
address 49.0001.1720.1600.1010.00;
}
}
}
user@R1# show protocols
mpls {
interface all;

Copyright 2015, Juniper Networks, Inc.

183

IS-IS Feature Guide for Routing Devices

interface fxp0.0 {
disable;
}
}
isis {
spf-options delay 1000;
backup-spf-options {
remote-backup-calculation;
node-link-degradation;
}
interface ge-1/0/0.1;
interface ge-1/5/0.12; {
link-protection;
}
interface all {
node-link-protection;
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.12 {
passive;
}
}
ldp {
auto-targeted-session {
teardown-delay 60;
maximum-sessions 20;
}
deaggregate;
interface all;
interface fxp0.0 {
disable;
}
}
user@R1# show policy-options
policy-options {
policy-statement ecmp {
term 1 {
then {
load-balance per-packet;
}
}
}
}
user@R1# show routing-options
forwarding-table {
export ecmp;
}

184

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

If you are done configuring the device, enter commit from the configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying the Routes on page 185

Verifying the IS-IS Routes on page 186

Verifying the LDP Routes on page 186

Verifying the Designated Backup Path Node on page 187

Verifying the Routes


Purpose
Action

Verify that the expected routes are learned.


On Device R1, from operational mode, run the show route command to display the routes
in the routing table.
user@R1> show route 1.1.4/24
inet.0: 14 destinations, 14 routes (14 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1.1.4.0/24

*[IS-IS/15] 11:37:58, metric 30


> to 1.1.6.11 via ge-1/5/0
to 1.1.1.2 via ge-1/0/0, Push 299824

user@R1> show route 1.1.4/24 detail


inet.0: 14 destinations, 14 routes (14 active, 0 holddown, 0 hidden)
1.1.4.0/24 (1 entry, 1 announced)
State: <FlashAll>
*IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 262154
Address: 0x98047cc
Next-hop reference count: 8
Next hop: 1.1.6.11 via ge-1/5/0 weight 0x1, selected
Session Id: 0x14b
Next hop: 1.1.1.2 via ge-1/0/0 weight 0x101 uflags Remote neighbor path
Label operation: Push 299824
Label TTL action: prop-ttl
Load balance label: Label 299824: None;
Session Id: 0x142
State:<Active Int>
Age: 11:38:00
Metric: 30
Validation State: unverified
Task: IS-IS
Announcement bits (3): 0-LDP 1-IS-IS 3-KRT
AS path: I

Meaning

The output shows all the routes in the routing table of Device R1.

Copyright 2015, Juniper Networks, Inc.

185

IS-IS Feature Guide for Routing Devices

Verifying the IS-IS Routes


Purpose
Action

Display all the LDP backup routes in the IS-IS routing table of Device R1.
On Device R1, from operational mode, run the show isis route command to display the
routes in the IS-IS routing table.
user@R1> show isis route
IS-IS routing table
IPv4/IPv6 Routes
---------------Prefix
L Version
Backup Score
1.1.2.0/24
1
558

Metric Type Interface

NH

Via

20 int

lt-1/2/0.1

IPV4 tp3-R2

1.1.3.0/24

558

30 int

lt-1/2/0.1

IPV4 tp3-R2

1.1.4.0/24

558

30 int

lt-1/2/0.12

IPV4 tp3-R6

lt-1/2/0.1

LSP

lt-1/2/0.12

IPV4 tp3-R6

lt-1/2/0.1

LSP

lt-1/2/0.12

IPV4 tp3-R6

lt-1/2/0.1

LSP

LDP->tp3-R4(10.255.102.156)
1.1.5.0/24
1
558

LDP->tp3-R4(10.255.102.156)
10.255.102.136/32 1
558

20 int

10 int

LDP->tp3-R4(10.255.102.156)
10.255.102.146/32 1
558

20 int

lt-1/2/0.1

IPV4 tp3-R2

10.255.102.156/32

30 int

lt-1/2/0.1

IPV4 tp3-R2

lt-1/2/0.12

IPV4 tp3-R6

lt-1/2/0.12

IPV4 tp3-R6

lt-1/2/0.1

LSP

lt-1/2/0.1

IPV4 tp3-R2

10.255.102.166/32

558

558

LDP->tp3-R4(10.255.102.156)
10.255.102.178/32 1
558

Meaning

Current version: L1: 558 L2: 564

20 int

10 int

The output shows all the LDP backup routes in the IS-IS routing table of Device R1.

Verifying the LDP Routes


Purpose

186

Verify the automatically targeted LDP routes.

Copyright 2015, Juniper Networks, Inc.

Chapter 7: Configuring IS-IS Link and Node Link Protection

Action

From operational mode, enter the show ldp session auto-targeted detail command.
user@R1> show ldp session auto-targeted detail
Address: 10.255.102.156, State: Operational, Connection: Open, Hold time: 21
Session ID: 10.255.102.128:0--10.255.102.156:0
Next keepalive in 1 seconds
Passive, Maximum PDU: 4096, Hold time: 30, Neighbor count: 1
Neighbor types: auto-targeted
Keepalive interval: 10, Connect retry interval: 1
Local address: 10.255.102.128, Remote address: 10.255.102.156
Up for 11:38:23
Capabilities advertised: none
Capabilities received: none
Protection: disabled
Session flags: none
Local - Restart: disabled, Helper mode: enabled
Remote - Restart: disabled, Helper mode: enabled
Local maximum neighbor reconnect time: 120000 msec
Local maximum neighbor recovery time: 240000 msec
Local Label Advertisement mode: Downstream unsolicited
Remote Label Advertisement mode: Downstream unsolicited
Negotiated Label Advertisement mode: Downstream unsolicited
MTU discovery: disabled
Nonstop routing state: Not in sync
Next-hop addresses received:
1.1.3.6
1.1.4.7
10.255.102.156

Meaning

The output shows automatically targeted LDP next hops.

Verifying the Designated Backup Path Node


Purpose
Action

Display the remote LFA next hop determined for a given destination.
From operational mode, enter the show isis backup spf results command.
user@R1> show isis backup spf results R6
IS-IS level 1 SPF results:
R6.00
Primary next-hop: ge-1/5/0, IPV4, R6, SNPA: 0:5:85:88:f0:bc
Root: R6, Root Metric: 10, Metric: 0, Root Preference: 0x0
Not eligible, IPV4, Reason: Primary next-hop link fate sharing
Root: R2, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: R6.00-00
track-item: R1.00-00
Not eligible, IPV4, Reason: Path loops
Root: R4, Root Metric: 30, Metric: 20, Root Preference: 0x0
track-item: R6.00-00
track-item: R4.00-00
Eligible, Backup next-hop: ge-1/0/0, LSP, LDP->R4(10.255.102.156), Prefixes: 2
1 nodes
IS-IS level 2 SPF results:
R6.00
Primary next-hop: ge-1/5/0, IPV4, R6, SNPA: 0:5:85:88:f0:bc
Root: R6, Root Metric: 10, Metric: 0, Root Preference: 0x0

Copyright 2015, Juniper Networks, Inc.

187

IS-IS Feature Guide for Routing Devices

Not eligible, IPV4, Reason: Primary next-hop link fate sharing


Root: R2, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: R6.00-00
track-item: R1.00-00
Not eligible, IPV4, Reason: Path loops
Root: R4, Root Metric: 30, Metric: 20, Root Preference: 0x0
track-item: R6.00-00
track-item: R4.00-00
Eligible, Backup next-hop: ge-1/0/0, LSP, LDP->R4(10.255.102.156), Prefixes: 0
1 nodes

Meaning

Related
Documentation

188

The output indicates whether a specific interface or node has been designated as a
remote backup path and why.

Understanding Remote LFA over LDP Tunnels in IS-IS Networks on page 174

auto-targeted-session

no-eligible-remote-backup on page 382

remote-backup-calculation on page 401

Copyright 2015, Juniper Networks, Inc.

CHAPTER 8

Configuring IS-IS Traffic Engineering

IS-IS Extensions to Support Traffic Engineering on page 189

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Example: Enabling IS-IS Traffic Engineering Support on page 191

Understanding Forwarding Adjacencies on page 205

Example: Advertising Label-Switched Paths into IS-IS on page 205

Understanding Wide IS-IS Metrics for Traffic Engineering on page 213

Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 213

Understanding LDP-IGP Synchronization on page 215

Example: Configuring Synchronization Between IS-IS and LDP on page 217

IS-IS Extensions to Support Traffic Engineering


To help provide traffic engineering and MPLS with information about network topology
and loading, extensions have been added to the Junos OS implementation of IS-IS.
Specifically, IS-IS supports new type, length, and value (TLV) tuples that specify link
attributes. These TLVs are included in the IS-IS link-state PDUs. The link-attribute
information is used to populate the traffic engineering database, which is used by the
Constrained Shortest Path First (CSPF) algorithm to compute the paths that MPLS
label-switched paths (LSPs) take. This path information is used by RSVP to set up LSPs
and reserve bandwidth for them.

NOTE: Whenever possible, use IS-IS interior gateway protocol (IGP) shortcuts
instead of traffic engineering shortcuts.

The traffic engineering extensions are defined in RFC 5305, IS-IS Extensions for Traffic
Engineering.

IS-IS IGP Shortcuts


In IS-IS, you can configure shortcuts, which allow IS-IS to use an LSP as the next hop as
if it were a subinterface from the ingress routing device to the egress routing device. The
address specified in the to statement at the [edit protocols mpls label-switched-path
lsp-path-name] hierarchy level must match the router ID of the egress routing device for

Copyright 2015, Juniper Networks, Inc.

189

IS-IS Feature Guide for Routing Devices

the LSP to function as a direct link to the egress routing device and to be used as input
to IS-IS SPF calculations. When used in this way, LSPs are no different than Asynchronous
Transfer Mode (ATM) and Frame Relay virtual circuits (VCs), except that LSPs carry only
IPv4 traffic.
Related
Documentation

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Example: Enabling IS-IS Traffic Engineering Support on page 191

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts


Link-state protocols, such as OSPF and IS-IS, use the shortest-path-first (SPF) algorithm
to compute the shortest-path tree to all nodes in the network. The results of such
computations can be represented by the destination node, next-hop address, and output
interface, where the output interface is a physical interface. Label-switched paths (LSPs)
can be used to augment the SPF algorithm, for the purposes of resolving BGP next hops.
On the node performing the calculations, LSPs appear to be logical interfaces directly
connected to remote nodes in the network. If you configure the interior gateway protocol
(IGP) to treat LSPs the same as a physical interface and use the LSPs as a potential
output interface, the SPF computation results are represented by the destination node
and output LSP, effectively using the LSP as a shortcut through the network to the
destination.
As an illustration, begin with a typical SPF tree (see Figure 19 on page 190).

Figure 19: Typical SPF Tree, Sourced from Router A

If an LSP connects Router A to Router D and if IGP shortcuts are enabled on Router A,
you might have the SPF tree shown in Figure 20 on page 190.

Figure 20: Modified SPF Tree, Using LSP AD as a Shortcut

190

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Note that Router D is now reachable through LSP AD.


When computing the shortest path to reach Router D, Router A has two choices:

Use IGP path ABD.

Use LSP AD.

Router A decides between the two choices by comparing the IGP metrics for path ABD
with the LSP metrics for LSP AD. If the IGP metric is lower, path ABD is chosen
(Figure 19 on page 190). If the LSP metric is lower, LSP AD is used (Figure 20 on page 190).
If both metrics are equal, LSP AD is chosen because LSPs are preferred over IGP paths.
Note that Routers E and F are also reachable through LSP AD, because they are
downstream from Router D in the SPF tree.
Assuming that another LSP connects Router A to Router E, you might have the SPF tree
shown in Figure 21 on page 191.

Figure 21: Modified SPF Tree, Using LSP AD and LSP AE as Shortcuts

Related
Documentation

traffic-engineering on page 413

Understanding OSPF Support for Traffic Engineering

Example: Enabling IS-IS Traffic Engineering Support


This example shows how to configure IS-IS so that it uses label-switched paths as
shortcuts.

Requirements on page 191

Overview on page 192

Configuration on page 193

Verification on page 200

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Copyright 2015, Juniper Networks, Inc.

191

IS-IS Feature Guide for Routing Devices

Overview
MPLS traffic engineering maps certain data flows to established label-switched paths
(LSPs) rather than to data links calculated by the interior gateway protocol (IGP) to be
part of the best (shortest) path. Fundamental to this function is the determination of
what traffic is to be mapped to an LSP. Traffic is mapped to an LSP at the tunnel's ingress
label switching router (LSR) by designating the egress LSR as the next-hop router for
certain destination prefixes.
It is important to understand that the LSP does not constitute an entire route to a
destination. Rather, the LSP is a next-hop segment of the route. Therefore, packets can
only be mapped to an LSP if the egress LSR is considered to be a feasible next-hop
candidate during the route resolution process.
Figure 22 on page 192 shows the topology used in this example.

Figure 22: IS-IS Shortcuts Topology


lo0:
A 192.168.0.1
B 192.168.0.2
C 192.168.0.3
D 192.168.0.4
E 192.168.0.5
F 192.168.0.6
G 192.168.0.7

Prefixes
10.2.0.0/16
10.3.0.0/16

AS 2

G
.26

10.0.0.24/30

.25
A

10.0.0.4/30
.5
fe-1/2/1

.6

.9

10.0.0.8/30

.10

10.0.0.12/30
C

.13

.14

.29

fe-1/2/0 .1

10.0.0.28/30

.2

.30

.17

.18
10.0.0.16/30

AS 1

g041306

LSP A-C
10.0.0.0/30

In this example, Device C has an external BGP (EBGP) peer session with Device G in
autonomous system (AS) 65520. In order to enable its internal BGP (IBGP) peers to
access subnets in AS 65520, Device G runs IS-IS passively on its interface connecting to
Device G. IS-IS has information about the external subnets and enters routes to these
subnets in the inet.0 routing table. BGP, when resolving the next-hop addresses of
AS-external routes, uses the IGP route.

TIP: An alternative to passively running IS-IS on the interface would be to


use a next-hop self policy.

192

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Device A has an LSP to Device C. The path is configured to always go through Device E,
rather than going through Device B.
Interior gateway protocol (IGP) shortcuts, also called traffic-engineering shortcuts,
provide a tool by which the link-state IGP (OSPF or IS-IS) in an AS can consider an LSP
in its shortest-path-first (SPF) calculations. If using passive external interfaces, the IGP
views an LSP as a single data link toward the destinations beyond the LSP egress device.
When you use traffic-engineering bgp (which is the default) and IGP shortcuts, the traffic
engineering solution is used for BGP AS-external route resolution only. However, traffic
to AS-internal destinations can also be mapped to LSPs. To accomplish this,
traffic-engineering bgp-igp is enabled. Thus, RSVP installs the MPLS prefixes into the
inet.0 table rather than the inet.3 table. As a result, the MPLS LSPs are installed in the
forwarding table.
This approach finds practical application whenever heavy traffic is routed to specific
destinations within an AS, such as server farms.
An important point about IGP shortcuts, whether used alone or in conjunction with
traffic-engineering BGP-IGP, is that IGP adjacencies are never formed across the LSPs.
The IGP sees the LSP as a single data link, but does not view the egress router as a
potential peer and does not forward hello messages across the LSP. Also, RSVP messages
are never forwarded over LSPs, preventing the possibility of an LSP being inadvertently
built within another LSP.
CLI Quick Configuration on page 193 shows the configuration for all of the devices in
Figure 22 on page 192. The section Step-by-Step Procedure on page 197 describes the
steps on Device A.

Configuration
CLI Quick
Configuration

Device A

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/1.0
set protocols mpls traffic-engineering bgp-igp
set protocols mpls label-switched-path test_path to 192.168.0.3
set protocols mpls label-switched-path test_path no-cspf
set protocols mpls label-switched-path test_path primary through_E
set protocols mpls path through_E 192.168.0.5 strict
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/1.0

Copyright 2015, Juniper Networks, Inc.

193

IS-IS Feature Guide for Routing Devices

set protocols bgp group int type internal


set protocols bgp group int local-address 192.168.0.1
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.2
set protocols bgp group int neighbor 192.168.0.3
set protocols isis traffic-engineering family inet shortcuts
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.1
set routing-options autonomous-system 1

194

Device B

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.6/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.9/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/1.0
set protocols rsvp interface lo0.0
set protocols mpls interface fe-1/2/1.0
set protocols mpls interface fe-1/2/0.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.2
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.3
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.2
set routing-options autonomous-system 1

Device C

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.10/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.25/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/3 unit 0 family inet address 10.0.0.29/30
set interfaces fe-1/2/3 unit 0 family iso
set interfaces fe-1/2/3 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/3.0
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/3.0

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

set protocols bgp group int type internal


set protocols bgp group int local-address 192.168.0.3
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.2
set protocols bgp group external-peers type external
set protocols bgp group external-peers export send-some-isis
set protocols bgp group external-peers peer-as 2
set protocols bgp group external-peers neighbor 10.0.0.26
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 2 passive
set protocols isis interface fe-1/2/3.0 level 1 disable
set protocols isis interface lo0.0
set policy-options policy-statement send-some-isis term 1 from protocol isis
set policy-options policy-statement send-some-isis term 1 from route-filter 10.0.0.0/24
orlonger
set policy-options policy-statement send-some-isis term 1 from route-filter 192.168.0.0/24
orlonger
set policy-options policy-statement send-some-isis term 1 then accept
set routing-options router-id 192.168.0.3
set routing-options autonomous-system 1

Device D

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.14/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0004.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.4
set routing-options autonomous-system 1

Device E

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.5/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/1.0
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/1.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.5
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.2
set protocols bgp group int neighbor 192.168.0.3
set protocols isis interface fe-1/2/0.0 level 1 disable

Copyright 2015, Juniper Networks, Inc.

195

IS-IS Feature Guide for Routing Devices

set protocols isis interface fe-1/2/1.0 level 1 disable


set protocols isis interface lo0.0
set routing-options router-id 192.168.0.5
set routing-options autonomous-system 1

196

Device F

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.30/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces fe-1/2/2 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.6/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0006.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/1.0
set protocols rsvp interface fe-1/2/2.0
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/1.0
set protocols mpls interface fe-1/2/2.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.6
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.2
set protocols bgp group int neighbor 192.168.0.3
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/2.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.6
set routing-options autonomous-system 1

Device G

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.26/30


set interfaces lo0 unit 0 family inet address 192.168.0.7/32 primary
set interfaces lo0 unit 0family inet address 10.2.1.1/32
set interfaces lo0 unit 0family inet address 10.3.1.1/32
set protocols bgp group external-peers type external
set protocols bgp group external-peers export statics
set protocols bgp group external-peers export send-directs
set protocols bgp group external-peers peer-as 1
set protocols bgp group external-peers neighbor 10.0.0.25
set policy-options policy-statement statics from protocol static
set policy-options policy-statement statics then accept
set policy-options policy-statement send-directs term 1 from protocol direct
set policy-options policy-statement send-directs term 1 then accept
set routing-options static route 10.2.0.0/32 reject
set routing-options static route 10.2.0.0/32 install
set routing-options static route 10.3.0.0/32 reject
set routing-options static route 10.3.0.0/32 install
set routing-options router-id 192.168.0.7
set routing-options autonomous-system 2

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS traffic-engineering shortcuts:
1.

Configure the interfaces.


[edit interfaces]
user@A# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@A# set fe-1/2/0 unit 0 family iso
user@A# set fe-1/2/0 unit 0 family mpls
user@A# set fe-1/2/1 unit 0 family inet address 10.0.0.5/30
user@A# set fe-1/2/1 unit 0 family iso
user@A# set fe-1/2/1 unit 0 family mpls
user@A# set lo0 unit 0 family inet address 192.168.0.1/32
user@A# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00

2.

Enable a signaling protocol on the interfaces.


[edit protocols rsvp]
user@A# set interface lo0.0
user@A# set interface fe-1/2/0.0
user@A# set interface fe-1/2/1.0

3.

Enable MPLS on the interfaces.


[edit protocols mpls]
user@A# set interface fe-1/2/0.0
user@A# set interface fe-1/2/1.0

4.

Configure the label-switched path.


A single LSP, named test_path, is configured from Device A to Device C. The LSP
explicit route object (ERO) is specified to use a strict hop through Device E, so that
the LSP takes a different path from the OSPF shortest path of ABC. The LSP is
signaled using RSVP, but no CSPF is running.
[edit protocols mpls]
user@A# set label-switched-path test_path to 192.168.0.3
user@A# set label-switched-path test_path no-cspf
user@A# set label-switched-path test_path primary through_E
user@A# set path through_E 192.168.0.5 strict

5.

Configure traffic engineering for both BGP and IGP destinations.


When IGP shortcuts are also enabled, the IGP can use the LSP in its calculations.
The results of the calculations are entered into the inet.0 table.
[edit protocols mpls]
user@A# set traffic-engineering bgp-igp

6.

Configure internal BGP (IBGP) peering among the devices.


[edit protocols bgp group int]
user@A# set type internal
user@A# set local-address 192.168.0.1
user@A# set neighbor 192.168.0.5
user@A# set neighbor 192.168.0.6

Copyright 2015, Juniper Networks, Inc.

197

IS-IS Feature Guide for Routing Devices

user@A# set neighbor 192.168.0.2


user@A# set neighbor 192.168.0.3
7.

Enable IS-IS on the interfaces, and set the link metric.


[edit protocols isis]
user@A# set interface fe-1/2/0.0 level 1 disable
user@A# set interface fe-1/2/1.0 level 1 disable
user@A# set interface lo0.0

8.

Configure IS-IS to use MPLS LSPs as next hops for the IPv4 address family.
It is only necessary to enable IGP shortcuts on the ingress router because that is the
router performing the shortest-path-first (SPF) calculations.
It is important to understand how IGP shortcuts affect the protocol and routing
table relationship. The IGP performs SPF calculations to subnets downstream of
LSP egress points, but the results of these calculations are entered into the inet.3
table only. At the same time, the IGP performs its traditional SPF calculations and
enters the results of these calculations into the inet.0 table. The result is that
although the IGP is making entries into the inet.3 table, BGP is still the only protocol
with visibility into that table for the purposes of route resolution. Therefore,
forwarding to AS-internal destinations still uses the inet.0 IGP routes, and the LSPs
are only used for BGP next-hop resolution. If you want the LSPs to be used for IGP
next-hop resolution, you must configure traffic-engineering bgp-igp.
[edit protocols isis]
user@A# set traffic-engineering family inet shortcuts

9.

Configure the router ID and the autonomous system (AS) number.


[edit routing-options]
user@A# set router-id 192.168.0.1
user@A# set autonomous-system 1

Results

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
user@A# show interfaces
fe-1/2/0 {
unit 0{
family inet {
address 10.0.0.1/30;
}
family iso;
family mpls;
}
}
fe-1/2/1{
unit 0
family inet {
address 10.0.0.5/30;
}
family iso;
family mpls;

198

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

}
}
lo0 {
unit 0{
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
user@A# show protocols
rsvp {
interface lo0.0;
interface fe-1/2/0.0;
interface fe-1/2/1.0;
}
mpls {
traffic-engineering bgp-igp;
label-switched-path test_path {
to 192.168.0.3;
no-cspf;
primary through_E;
}
path through_E {
192.168.0.5 strict;
}
interface fe-1/2/0.0;
interface fe-1/2/1.0;
}
bgp {
group int {
type internal;
local-address 192.168.0.1;
neighbor 192.168.0.5;
neighbor 192.168.0.6;
neighbor 192.168.0.2;
neighbor 192.168.0.3;
}
}
isis {
traffic-engineering {
family inet {
shortcuts;
}
}
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
}
interface lo0.0;
}

Copyright 2015, Juniper Networks, Inc.

199

IS-IS Feature Guide for Routing Devices

user@A# show routing-options


router-id 192.168.0.1;
autonomous-system 1;

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying the Next Hops on page 200

Checking the RSVP Sessions on page 202

Checking the Paths with Different Traffic Engineering Settings on page 203

Verifying the Next Hops


Purpose
Action

Verify that the MPLS LSP is used as the next hop in the expected routes.
From operational mode, enter the show route command.
user@A> show route
inet.0: 21 destinations, 21 routes (21 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.0/30
10.0.0.1/32
10.0.0.4/30
10.0.0.5/32
10.0.0.8/30
10.0.0.12/30
10.0.0.16/30
10.0.0.20/30
10.0.0.24/30
10.0.0.28/30

10.2.0.0/32

10.2.1.1/32

10.3.0.0/32

10.3.1.1/32

200

*[Direct/0] 4d 09:07:26
>
via fe-1/2/0.0
*[Local/0] 4d 09:07:26
Local via fe-1/2/0.0
*[Direct/0] 4d 09:07:28
>
via fe-1/2/1.0
*[Local/0] 4d 09:07:28
Local via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 20
> to 10.0.0.6 via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 30
> to 10.0.0.6 via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 20
> to 10.0.0.2 via fe-1/2/0.0
*[IS-IS/18] 01:42:24, metric 30
> to 10.0.0.2 via fe-1/2/0.0
*[IS-IS/18] 01:42:24, metric 30
> to 10.0.0.6 via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 30
to 10.0.0.6 via fe-1/2/1.0
> to 10.0.0.2 via fe-1/2/0.0
*[BGP/170] 02:22:30, localpref 100, from 192.168.0.3
AS path: 2 I, validation-state: unverified
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path test_path
*[BGP/170] 02:20:23, localpref 100, from 192.168.0.3
AS path: 2 I, validation-state: unverified
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path test_path
*[BGP/170] 02:22:30, localpref 100, from 192.168.0.3
AS path: 2 I, validation-state: unverified
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path test_path
*[BGP/170] 02:20:23, localpref 100, from 192.168.0.3
AS path: 2 I, validation-state: unverified
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path test_path

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

192.168.0.1/32
192.168.0.2/32
192.168.0.3/32
192.168.0.4/32

192.168.0.5/32
192.168.0.6/32
192.168.0.7/32

*[Direct/0] 4d 09:08:47
>
via lo0.0
*[IS-IS/18] 01:42:24, metric 10
> to 10.0.0.6 via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 20
> to 10.0.0.6 via fe-1/2/1.0
*[IS-IS/18] 01:42:24, metric 30
> to 10.0.0.6 via fe-1/2/1.0
to 10.0.0.2 via fe-1/2/0.0
*[IS-IS/18] 01:42:24, metric 10
> to 10.0.0.2 via fe-1/2/0.0
*[IS-IS/18] 01:42:24, metric 20
> to 10.0.0.2 via fe-1/2/0.0
*[BGP/170] 02:20:23, localpref 100, from 192.168.0.3
AS path: 2 I, validation-state: unverified
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path test_path

inet.3: 5 destinations, 6 routes (5 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
10.0.0.12/30
10.0.0.24/30
10.0.0.28/30
192.168.0.3/32

192.168.0.4/32

*[IS-IS/18] 01:41:21, metric 30


> to 10.0.0.2 via fe-1/2/0.0, label-switched-path
*[IS-IS/18] 01:41:21, metric 30
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path
*[IS-IS/18] 01:41:21, metric 30
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path
*[RSVP/7/1] 01:41:21, metric 20
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path
[IS-IS/18] 01:41:21, metric 20
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path
*[IS-IS/18] 01:41:21, metric 30
> to 10.0.0.2 via fe-1/2/0.0, label-switched-path

test_path
test_path
test_path
test_path
test_path
test_path

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0002.0192.0168.0001/72
*[Direct/0] 4d 09:08:47
>
via lo0.0
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0
1
2
13

Meaning

*[MPLS/0] 4d 09:10:00,
Receive
*[MPLS/0] 4d 09:10:00,
Receive
*[MPLS/0] 4d 09:10:00,
Receive
*[MPLS/0] 4d 09:10:00,
Receive

metric 1
metric 1
metric 1
metric 1

IS-IS chooses the LSP as the shortest path to destinations downstream of the LSP egress
device. Additionally, because the IGP uses the LSP to reach external subnet 10.0.0.24/30,
BGP also uses the LSP in its routes to 10.2.0.0 and 10.3.0.0.
If next-hop self were used at Device C, BGP would still choose the LSP over the IGP path.

Copyright 2015, Juniper Networks, Inc.

201

IS-IS Feature Guide for Routing Devices

Checking the RSVP Sessions


Purpose
Action

Display information about RSVP sessions


From operational mode, enter the show rsvp session brief command.
user@A> show rsvp session brief
Ingress RSVP: 1 sessions
To
From
State
192.168.0.3
192.168.0.1
Up
Total 1 displayed, Up 1, Down 0

Rt Style Labelin Labelout LSPname


0 1 FF
299776 test_path

Egress RSVP: 0 sessions


Total 0 displayed, Up 0, Down 0
Transit RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
user@E> show rsvp session brief
Ingress RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
Egress RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
Transit RSVP: 1 sessions
To
From
State
192.168.0.3
192.168.0.1
Up
Total 1 displayed, Up 1, Down 0

Rt Style Labelin Labelout LSPname


0 1 FF 299776
299808 test_path

user@F> show rsvp session brief


Ingress RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
Egress RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
Transit RSVP: 1 sessions
To
From
State
192.168.0.3
192.168.0.1
Up
Total 1 displayed, Up 1, Down 0

Rt Style Labelin Labelout LSPname


0 1 FF 299808
3 test_path

user@C> show rsvp session brief


Ingress RSVP: 0 sessions
Total 0 displayed, Up 0, Down 0
Egress RSVP: 1 sessions
To
From
State
192.168.0.3
192.168.0.1
Up
Total 1 displayed, Up 1, Down 0

Rt Style Labelin Labelout LSPname


0 1 FF
3
- test_path

Transit RSVP: 0 sessions


Total 0 displayed, Up 0, Down 0

Meaning

202

On all four routing devices, the ingress and egress IP addresses of the LSP are shown.
The path is shown as an ingress path at Device A, and packets forwarded on the LSP are
assigned a label of 299776. At Device E, the LSP is transit, and packets arriving with a
label of 299776 are given an outgoing label of 299808. The labels have significance only

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

between neighboring label-switched routers (LSRs). Device F swaps incoming label


299808 for outgoing label 3. Device C, the egress, pops label 3 and routes the received
packet by standard IP longest-match route lookup.

Checking the Paths with Different Traffic Engineering Settings


Purpose

Action

Check the paths used for IGP and BGP routes when traffic-engineering bgp-igp is used
and when traffic-engineering bgp (the default) is used.
1.

Configure traffic-engineering bgp.


This removes traffic-engineering bgp-igp from the configuration because only one
MPLS traffic engineering setting can be configured in each routing instance.
[edit protocols mpls]
user@A# set traffic-engineering bgp
user@A# commit

2. Use the show route forwarding-table command to check the paths when

traffic-engineering bgp (the default) is configured.


user@A> show route forwarding-table destination 10.2.1.1
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
Type Index NhRef Netif
10.2.1.1/32
user
0
indr 262145
6
10.0.0.2
Push 299776 1013
2
fe-1/2/0.0
user@A> show route forwarding-table destination 192.168.0.3
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
Type Index NhRef Netif
192.168.0.3/32
user
1 10.0.0.6
ucst
938
11 fe-1/2/1.0
3. Use the traceroute command to check the paths when traffic-engineering bgp (the

default) is configured.
user@A> traceroute 10.2.1.1
traceroute to 10.2.1.1 (10.2.1.1), 30 hops max, 40 byte packets
1 10.0.0.2 (10.0.0.2) 11.086 ms 1.587 ms 1.603 ms
MPLS Label=299776 CoS=0 TTL=1 S=1
2 10.0.0.18 (10.0.0.18) 1.455 ms 1.477 ms 1.442 ms
MPLS Label=299808 CoS=0 TTL=1 S=1
3 10.0.0.29 (10.0.0.29) 2.240 ms 1.045 ms 1.243 ms
4 10.2.1.1 (10.2.1.1) 1.363 ms 1.389 ms 1.374 ms
user@A> traceroute 192.168.0.3
traceroute to 192.168.0.3 (192.168.0.3), 30 hops max, 40 byte packets
1 10.0.0.6 (10.0.0.6) 1.759 ms 1.872 ms 2.281 ms
2 bb03-cclab-lo0.spglab.juniper.net (192.168.0.3) 2.119 ms 2.157 ms
ms

1.598

4. Configure traffic-engineering bgp-igp.

This removes traffic-engineering bgp from the configuration because only one MPLS
traffic engineering setting can be configured in each routing instance.
[edit protocols mpls]
user@A# set traffic-engineering bgp-igp

Copyright 2015, Juniper Networks, Inc.

203

IS-IS Feature Guide for Routing Devices

user@A# commit
5. Use the show route forwarding-table command to check the paths when

traffic-engineering bgp-igp is configured.


user@A> show route forwarding-table destination 10.2.1.1
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
Type Index NhRef Netif
10.2.1.1/32
user
0
indr 262145
6
10.0.0.2
Push 299776 1013
2
fe-1/2/0.0
user@A> show route forwarding-table destination 192.168.0.3
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
Type Index NhRef Netif
192.168.0.3/32
user
1 10.0.0.2
Push 299776 1013
8
fe-1/2/0.0
6. Use the traceroute command to check the paths when traffic-engineering bgp-igp is

configured.
user@A> traceroute 10.2.1.1
traceroute to 10.2.1.1 (10.2.1.1), 30 hops max, 40 byte packets
1 10.0.0.2 (10.0.0.2) 2.348 ms 1.475 ms 1.434 ms
MPLS Label=299776 CoS=0 TTL=1 S=1
2 10.0.0.18 (10.0.0.18) 1.507 ms 2.307 ms 1.911 ms
MPLS Label=299808 CoS=0 TTL=1 S=1
3 10.0.0.29 (10.0.0.29) 1.743 ms 1.645 ms 1.940 ms
4 10.2.1.1 (10.2.1.1) 2.041 ms 1.977 ms 2.233 ms
user@A> traceroute 192.168.0.3
traceroute to 192.168.0.3 (192.168.0.3), 30 hops max, 40 byte packets
1 10.0.0.2 (10.0.0.2) 1.721 ms 2.558 ms 2.229 ms
MPLS Label=299776 CoS=0 TTL=1 S=1
2 10.0.0.18 (10.0.0.18) 2.505 ms 1.462 ms 1.408 ms
MPLS Label=299808 CoS=0 TTL=1 S=1
3 bb03-cclab-lo0.spglab.juniper.net (192.168.0.3) 1.371 ms 1.422 ms
ms

Meaning

1.351

When traffic-engineering bgp is configured, the first trace is to a destination belonging to


the BGP-learned 10.2.0.0/16 prefix, and follows the LSP. The second trace is to the
IS-IS-learned 192.168.0.3 route (Device Cs loopback interface address), and follows the
IS-IS route. These results correspond to what we observe in the forwarding table. The
forwarding table is built based on routes in inet.0 only. BGP can look into inet.3 and select
an LSP as the best path to the next hop of a BGP prefix, and can add a route into inet.0
utilizing that LSP. An entry is then made to the forwarding table from the inet.0 route.
No other protocol, by default, can consult inet.3, and the inet.3 routes are not entered
into inet.0. Therefore, the forwarding entry for 192.168.0.3 is created from the only route
to that destination in inet.0: the IS-IS route.
When traffic-engineering bgp-igp is configured, the first trace to 10.2.1.1 continues to follow
the LSP. The second trace to 192.168.0.3 also follows the LSP. These results correspond
to what we observe in the forwarding table, which shows that the LSP is used for IGP
next-hop resolution.

204

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Related
Documentation

Advertising LSPs into IGPs

Example: Enabling OSPF Traffic Engineering Support

Understanding Forwarding Adjacencies


A forwarding adjacency is a traffic engineering label-switched path (LSP) that is
configured between two nodes and that is used by the interior gateway protocol (IGP)
to forward traffic.
When you set up MPLS traffic-engineering tunnels between sites, by default the IGP does
not consider those tunnels for traffic forwarding. Forwarding adjacencies allow you to
treat a traffic engineering LSP tunnel as a link in an IGP topology. The link is used in the
shortest-path-first (SPF) algorithm and is advertised to the IGP peers. A forwarding
adjacency can be created between routing devices regardless of their location in the
network.
Related
Documentation

Example: Advertising Label-Switched Paths into IS-IS on page 205

Example: Advertising Label-Switched Paths into IS-IS


This example shows how to advertise label-switched paths (LSPs) into IS-IS as
point-to-point links (sometimes referred to as forwarding adjacencies) so that the LSPs
can be used in SPF calculations. The advertisement contains a local address (the from
address of the LSP), a remote address (the to address of the LSP), and a metric.

Requirements on page 205

Overview on page 205

Configuration on page 206

Verification on page 211

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
Figure 23 on page 206 shows the topology used in this example.

Copyright 2015, Juniper Networks, Inc.

205

IS-IS Feature Guide for Routing Devices

Figure 23: IS-IS Advertising a Label-Switched Path Topology


A

.5
10
.6
.1 10.0.0.4/30

.9

10
10.0.0.8/30

.10

15

10 10.0.0.0/30

.13
10
.14
D
10.0.0.12/30
.22
10.0.0.20/30 10

LSP E-D
.2

Lo0:
A 192.168.0.1
B 192.168.0.2
C 192.168.0.3
D 192.168.0.4
E 192.168.0.5
F 192.168.0.6

20
.17 10.0.0.16/30 .18

.21
F

g041304

The example shows how to configure the LSP from Device E to Device D and then
advertise this path through IS-IS. The configuration is verified by performing a traceroute
operation from Device A to Device D and making sure that the LSP is used for forwarding.
CLI Quick Configuration on page 206 shows the configuration for all of the devices in
Figure 23 on page 206. The section Step-by-Step Procedure on page 208 describes the
steps on Device E.

Configuration
CLI Quick
Configuration

206

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device A

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/0.0
set protocols mpls interface fe-1/2/0.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.1
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.4
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/0.0 level 2 metric 10
set protocols isis interface fe-1/2/0.5 level 2 metric 10
set protocols isis interface fe-1/2/0.5 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.1
set routing-options autonomous-system 1

Device B

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.6/30

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

set interfaces fe-1/2/0 unit 0 family iso


set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.9/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 2 metric 10
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.2

Device C

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.10/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 2 metric 10
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.3

Device D

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.14/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.22/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0004.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/1.0
set protocols mpls label-switched-path E-D to 192.168.0.5
set protocols mpls interface fe-1/2/1.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.4
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.6
set protocols isis interface fe-1/2/0.14 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set protocols isis label-switched-path E-D level 2
set routing-options router-id 192.168.0.4
set routing-options autonomous-system 1

Device E

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.5/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
set protocols rsvp interface lo0.0

Copyright 2015, Juniper Networks, Inc.

207

IS-IS Feature Guide for Routing Devices

set protocols rsvp interface fe-1/2/0.0


set protocols rsvp interface fe-1/2/1.0
set protocols mpls label-switched-path E-D to 192.168.0.4
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/1.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.5
set protocols bgp group int neighbor 192.168.0.6
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.4
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 2 metric 20
set protocols isis interface lo0.0
set protocols isis label-switched-path E-D level 2 metric 15
set routing-options router-id 192.168.0.5
set routing-options autonomous-system 1

Device F

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.18/30


set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/0 unit 0 family mpls
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/1 unit 0 family mpls
set interfaces lo0 unit 0 family inet address 192.168.0.6/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0006.00
set protocols rsvp interface lo0.0
set protocols rsvp interface fe-1/2/0.0
set protocols rsvp interface fe-1/2/1.0
set protocols mpls interface fe-1/2/0.0
set protocols mpls interface fe-1/2/1.0
set protocols bgp group int type internal
set protocols bgp group int local-address 192.168.0.6
set protocols bgp group int neighbor 192.168.0.1
set protocols bgp group int neighbor 192.168.0.5
set protocols bgp group int neighbor 192.168.0.4
set protocols isis interface fe-1/2/0.0 level 1 disable
set protocols isis interface fe-1/2/1.0 level 2 metric 10
set protocols isis interface fe-1/2/1.0 level 1 disable
set protocols isis interface lo0.0
set routing-options router-id 192.168.0.6
set routing-options autonomous-system 1

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To advertise LSPs into IS-IS:
1.

Configure the interfaces.


[edit interfaces]
user@E# set fe-1/2/0 unit 0 family inet address 10.0.0.2/30
user@E# set fe-1/2/0 unit 0 family iso
user@E# set fe-1/2/0 unit 0 family mpls

208

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

user@E# set fe-1/2/1 unit 0 family inet address 10.0.0.17/30


user@E# set fe-1/2/1 unit 0 family iso
user@E# set fe-1/2/1 unit 0 family mpls
user@E# set lo0 unit 0 family inet address 192.168.0.5/32
user@E# set lo0 unit 0 family iso address 49.0002.0192.0168.0005.00
2.

Enable a signaling protocol on the interfaces.


[edit protocols rsvp]
user@E# set interface lo0.0
user@E# set interface fe-1/2/0.0
user@E# set interface fe-1/2/1.0

3.

Enable MPLS on the interfaces.


[edit protocols mpls]
user@E# set interface fe-1/2/0.0
user@E# set interface fe-1/2/1.0

4.

Configure the LSP.


Make sure that you configure the reverse LSP on the endpoint, in this case on Device
D.
[edit protocols mpls]
user@E# set label-switched-path E-D to 192.168.0.4

5.

Configure internal BGP (IBGP) peering among the devices that must run MPLS.
[edit protocols bgp group int]
user@E# set type internal
user@E# set local-address 192.168.0.5
user@E# set neighbor 192.168.0.6
user@E# set neighbor 192.168.0.1
user@E# set neighbor 192.168.0.4

6.

Enable IS-IS on the interfaces, and set the link metric.


IS-IS Level 1 and Level 2 are enabled when you include the interface at [edit protocols
isis]. By disabling Level 1, you are in effect creating a Level 2 IS-IS interface.
[edit protocols isis]
user@E# set interface fe-1/2/0.0 level 1 disable
user@E# set interface fe-1/2/1.0 level 1 disable
user@E# set interface fe-1/2/1.0 level 2 metric 20
user@E# set interface lo0.0

7.

Advertise the LSP through IS-IS.


Make sure that you advertise the LSP on the endpoint, in this case on Device D.
[edit protocols isis]
user@E# set label-switched-path E-D level 2 metric 15

8.

Configure the router ID and the autonomous system (AS) number.


[edit routing-options]
user@E# set router-id 192.168.0.5
user@E# set autonomous-system 1

Copyright 2015, Juniper Networks, Inc.

209

IS-IS Feature Guide for Routing Devices

Results

From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show routing-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.
user@E# show interfaces
fe-1/2/0 {
unit 0 {
family inet {
address 10.0.0.2/30;
}
family iso;
family mpls;
}
}
fe-1/2/1 {
unit 0 {
family inet {
address 10.0.0.17/30;
}
family iso;
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.5/32;
}
family iso {
address 49.0002.0192.0168.0005.00;
}
}
}
user@E# show protocols
rsvp {
interface lo0.0;
interface fe-1/2/0.0;
interface fe-1/2/1.0;
}
mpls {
label-switched-path E-D {
to 192.168.0.4;
}
interface fe-1/2/0.0;
interface fe-1/2/1.0;
}
bgp {
group int {
type internal;
local-address 192.168.0.5;
neighbor 192.168.0.6;
neighbor 192.168.0.1;
neighbor 192.168.0.4;
}
}

210

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

isis {
interface fe-1/2/0.0 {
level 1 disable;
}
interface fe-1/2/1.0 {
level 1 disable;
level 2 metric 20;
}
interface lo0.0;
label-switched-path E-D {
level 2 metric 15;
}
}
user@E# show routing-options
router-id 192.168.0.5;
autonomous-system 1;

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying the IS-IS Neighbor on page 211

Checking the IS-IS SPF Calculations on page 212

Checking the Forwarding Path on page 212

Verifying the IS-IS Neighbor


Purpose

Action

Verify that another neighbor is listed and is reachable over the LSP. The interface field
indicates the name of the LSP.
From operational mode, enter the show isis adjacency detail command.
user@E> show isis adjacency detail
D
Interface: E-D, Level: 2, State: One-way, Expires in 0 secs
Priority: 0, Up/Down transitions: 1, Last transition: 1d 00:34:58 ago
Circuit type: 3, Speaks: IP
Topologies: Unicast
Restart capable: No, Adjacency advertisement: Advertise
IP addresses: 192.168.0.4
F
Interface: fe-1/2/1.0, Level: 2, State: Up, Expires in 7 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 01:16:22 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bd
Topologies: Unicast
Restart capable: Yes, Adjacency advertisement: Advertise
LAN id: F.02, IP addresses: 10.0.0.18
A
Interface: fe-1/2/0.0, Level: 2, State: Up, Expires in 20 secs
Priority: 64, Up/Down transitions: 1, Last transition: 1d 01:17:20 ago
Circuit type: 2, Speaks: IP, IPv6, MAC address: 0:5:85:8f:c8:bc
Topologies: Unicast

Copyright 2015, Juniper Networks, Inc.

211

IS-IS Feature Guide for Routing Devices

Restart capable: Yes, Adjacency advertisement: Advertise


LAN id: E.02, IP addresses: 10.0.0.1

Meaning

As expected, Interface: E-D is shown in the output, and the state is shown as One-way.

Checking the IS-IS SPF Calculations


Purpose
Action

Verify that the LSP is being used in the SPF calculations.


From operational mode, enter the show isis spf brief command.
user@E> show isis spf brief
IS-IS level 1 SPF results:
Node
Metric
Interface
E.00
0
1 nodes
IS-IS level
Node
C.02
C.00
D.03
D.02
F.00
B.00
B.02
D.00
A.00
E.02
E.00
11 nodes

Meaning

2 SPF results:
Metric
Interface
30
fe-1/2/0.0
25
fe-1/2/1.0
25
fe-1/2/1.0
25
fe-1/2/1.0
20
fe-1/2/1.0
20
fe-1/2/0.0
20
fe-1/2/0.0
15
fe-1/2/1.0
10
fe-1/2/0.0
10
0

NH

NH
IPV4 A
LSP E-D
LSP E-D
LSP E-D
IPV4 F
IPV4 A
IPV4 A
LSP E-D
IPV4 A

Via

Via

SNPA

SNPA
0:5:85:8f:c8:bc

0:5:85:8f:c8:bd
0:5:85:8f:c8:bc
0:5:85:8f:c8:bc
0:5:85:8f:c8:bc

As expected, the SPF results include the LSP, E-D.

Checking the Forwarding Path


Purpose

Action

Meaning

Related
Documentation

212

Verify that a traceroute operation from Device A to Device D uses the LSP.

user@A> traceroute 192.168.0.4


traceroute to 192.168.0.4 (192.168.0.4), 30 hops max, 40 byte packets
1 10.0.0.2 (10.0.0.2) 1.092 ms 1.034 ms 1.174 ms
2 10.0.0.18 (10.0.0.18) 1.435 ms 2.062 ms 2.232 ms
MPLS Label=299792 CoS=0 TTL=1 S=1
3 bb04-cclab-lo0.spglab.juniper.net (192.168.0.4) 2.286 ms 1.432 ms
ms

1.354

The output shows that the LSP is used.

Advertising LSPs into IGPs

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Understanding Wide IS-IS Metrics for Traffic Engineering


All OSPF and IS-IS interfaces have a cost, which is a routing metric that is used in the
link-state calculation. Routes with lower total path metrics are preferred over those with
higher path metrics. Unlike OSPF, in which the link metric is calculated automatically
based on bandwidth, there is no automatic calculation for IS-IS. All IS-IS links use a metric
of 10 by default.
Normally, IS-IS metrics can have values up to 63. The total cost to a destination is the
sum of the metrics on all outgoing interfaces along a particular path from the source to
the destination. By default, the total path metric is limited to 1023. This metric value is
insufficient for large networks and provides too little granularity for traffic engineering,
especially with high-bandwidth links. A wider range of metrics is also required if route
leaking is used.
IS-IS generates two type, length, and value (TLV) tuples, one for an IS-IS adjacency and
the second for an IP prefix. To allow IS-IS to support traffic engineering, a second pair of
TLVs has been added to IS-IS, one for IP prefixes and the second for IS-IS adjacency and
traffic engineering information. With these TLVs, IS-IS metrics can have values up
24
to 16,777,215 (2 1).
By default, Junos OS supports the sending and receiving of wide metrics. Junos OS allows
a maximum metric value of 63 and generates both pairs of TLVs. To configure IS-IS to
generate only the new pair of TLVs and thus to allow the wider range of metric values,
you must include the wide-metrics-only statement in the IS-IS configuration.
Related
Documentation

Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 213

Example: Enabling Wide IS-IS Metrics for Traffic Engineering


This example shows how to allow a wide range of metric values on IS-IS interfaces.

Requirements on page 213

Overview on page 213

Configuration on page 214

Verification on page 215

Requirements
Before you begin, configure IS-IS on both routers. See Example: Configuring IS-IS on
page 14 for information about the sample IS-IS configuration.

Overview
Figure 24 on page 214 shows the topology used in this example.

Copyright 2015, Juniper Networks, Inc.

213

IS-IS Feature Guide for Routing Devices

Figure 24: IS-IS Wide Metrics Topology


10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

This example describes the steps on Device R1.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

Step-by-Step
Procedure

set protocols isis level 2 wide-metrics-only


set protocols isis level 1 wide-metrics-only
set protocols isis interface lt-1/2/0.1 level 2 metric 100
set protocols isis interface lt-1/2/0.1 level 1 metric 100

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS checksums:
1.

Configure a metric of 100 on the interface at both IS-IS levels.


[edit protocols isis interface lt-1/2/0.1]
user@R1# set level 2 metric 100
user@R1# set level 1 metric 100

2.

Enable wide metrics.


[edit protocols isis]
user@R1# set level 2 wide-metrics-only
user@R1# set level 1 wide-metrics-only

Results

From configuration mode, confirm your configuration by entering the show protocols
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@R1# show protocols
isis {
level 2 wide-metrics-only;
level 1 wide-metrics-only;
interface lt-1/2/0.1 {
level 2 metric 100;
level 1 metric 100;
}
}

If you are done configuring the device, enter commit from configuration mode.

214

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Verification
Confirm that the configuration is working properly.

Verifying That Wide Metrics Are Enabled


Purpose
Action

Make sure that the interface has the expected metric.


From operational mode, enter the show isis interface extensive command.
user@R1> show isis interface lt-1/2/0.1 extensive
IS-IS interface database:
lt-1/2/0.1
Index: 68, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 1, Priority: 64, Metric: 100
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R2.02 (not us)
Level 2
Adjacencies: 1, Priority: 64, Metric: 100
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R2.02 (not us)

Meaning

Related
Documentation

The output shows that the metric is set to 100, as expected, at both Level 1 and Level 2.

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Understanding LDP-IGP Synchronization


Synchronization between the Label Distribution Protocol (LDP) and the underlying interior
gateway protocol (IGP) ensures that LDP is fully established before the IGP path is used
for forwarding traffic.
LDP is often used to establish MPLS label-switched paths (LSPs) throughout a complete
network domain using an IGP such as OSPF or IS-IS. In such a network, all links in the
domain have IGP adjacencies as well as LDP adjacencies. LDP establishes the LSPs on
the shortest path to a destination as determined by IP forwarding.
If the IGP and LDP are not synchronized, packet loss can occur. This issue is especially
significant for applications such as a core network that does not employ BGP. Another
example is an MPLS VPN where each provider edge (PE) router depends on the availability
of a complete MPLS forwarding path to the other PE devices for each VPN that it serves.
This means that along the shortest path between the PE routers, each link must have
an operational hello adjacency and an operational LDP session, and MPLS label bindings
must have been exchanged over each session.
LDP establishes MPLS LSPs along the shortest path to the destination as determined
by IP forwarding. In a Layer 2 VPN or Layer 3 VPN scenario, if the LSP is not yet formed

Copyright 2015, Juniper Networks, Inc.

215

IS-IS Feature Guide for Routing Devices

between the PE devices, services depending on MPLS forwarding fail. When LDP has not
completed exchanging label bindings with an IGP next hop, traffic is discarded if the head
end of the LSP forwards traffic because the LSP is assumed to be in place.
There are various reasons that the LSP fails to come up, as follows:

Configuration errors and implementation issues.

When an LDP hello adjacency or an LDP session with a peer is lost due to some error
while the IGP still points to that peer. IP forwarding of traffic continues on the IGP link
associated with the LDP peer rather than being shifted to another IGP link with which
LDP is synchronized.

When a new IGP link comes up, causing the next hop to a certain destination to change
in the IGPs shortest-path-first (SPF) calculations. Although the IGP might be up on
the new link, LDP might not have completed label exchange for all the routes. This
condition might be transient or due to a misconfiguration.

LDP-IGP synchronization discourages a link from being used while the LDP sessions are
not fully established. When LDP is not fully operational on a link, the IGP advertises a
maximum cost for the link, thus preventing traffic from flowing through it. The IGP does
not advertise the original cost or metric for the link until either LDP label exchange has
been completed with the peer on the link or a configured amount of time has passed
(the holddown period).
When synchronization is configured, LDP notifies the IGP to advertise the maximum cost
for the link when one of the following triggering events takes place:

The LDP hello adjacency goes down.

The LDP session goes down.

LDP is configured on an interface.

If the holddown timer has been configured, the timer starts when the triggering event
takes place. When the timer expires, LDP notifies the IGP to resume advertising the original
cost.
If the holddown timer has not been configured, the IGP waits (endlessly) until bindings
have been received from downstream routers for all the forwarding equivalence classes
(FECs) that have a next hop on that interface. Only after that takes place does LDP notify
the IGP to bring down the cost on the interface.
LDP-IGP synchronization is supported only for directly connected peers and links with
the platform label space.

Synchronization Behavior During Graceful Restart


LDP-IGP synchronization does not take place while the IGP is in the process of a graceful
restart. When the graceful restart completes, links for which synchronization has been
configured are advertised with maximum metrics in either of the following cases:

216

LDP is not yet operational on the link and no holddown timer has been configured.

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

The configured holddown timer has not expired.

During LDP graceful restart, no synchronization operations are done. If the LDP graceful
restart is terminated, LDP notifies the IGPs to advertise the links with the maximum
metric.

Synchronization Behavior on LAN Interfaces


LDP-IGP synchronization does not take place on LAN interfaces unless the IGP has a
point-to-point connection over the LAN configured on the interface. The reason for this
is that multiple LDP peers might be connected on such an interface unless a point-to-point
connection to a single peer has been configured. Because synchronization raises the cost
on the interface high enough to prevent traffic from being forwarded to that link, if multiple
peers are connected, the cost is raised on all the peers even though LDP might be
unsynchronized with only one of the peers. Consequently, traffic is diverted away from
all the peers, an undesirable situation.

Synchronization Behavior on IGP Passive Interfaces


On IGP passive interfaces, the link cost is not raised when LDP-IGP synchronization is
configured and a triggering event occurs.

Synchronization and TE Metrics


When traffic engineering is configured for an IGP, LDP-IGP synchronization does not
affect the traffic engineering metric advertised for the link, regardless of whether the
traffic-engineering (TE) metric is explicitly configured or the default value.
Related
Documentation

Example: Configuring Synchronization Between IS-IS and LDP on page 217

Example: Configuring Synchronization Between IS-IS and LDP


This example shows how to enable synchronization between IS-IS and LDP.

Requirements on page 217

Overview on page 217

Configuration on page 218

Verification on page 220

Requirements
Before you begin, configure IS-IS and LDP. For an example, see Example: Configuring a
Layer 3 VPN with Route Reflection and AS Override.

Overview
LDP distributes labels in non-traffic-engineered applications. Labels are distributed along
the best path determined by IS-IS. If the synchronization between LDP and IS-IS is lost,
the label-switched path (LSP) goes down. Therefore, LDP and IS-IS synchronization is
beneficial. When LDP synchronization is configured and when LDP is not fully operational
on a given link (a session is not established and labels are not exchanged), IS-IS advertises

Copyright 2015, Juniper Networks, Inc.

217

IS-IS Feature Guide for Routing Devices

the link with the maximum cost metric. The link is not preferred but remains in the network
topology.
LDP synchronization is supported only on point-to-point interfaces and LAN interfaces
configured as point-to-point interfaces under IS-IS. LDP synchronization is not supported
during graceful restart.
To advertise the maximum cost metric until LDP is operational for LDP synchronization,
include the ldp-synchronization statement:
ldp-synchronization {
disable;
hold-time seconds;
}

To disable synchronization, include the disable statement. To configure the time period
to advertise the maximum cost metric for a link that is not fully operational, include the
hold-time statement.

NOTE: When an interface has been in the holddown state for more than
3 minutes, a system log message with a warning level is sent. This message
appears in both the messages file and the trace file.

Figure 25 on page 218 shows the topology used in this example.

Figure 25: IS-IS and LDP Synchronization Topology


AS 65534
AS 64512
CE1

.1

10.0.0.0/30
.2

PE1

10.0.0.4/30
.5
.6
.21

P1

10.0.0.8/30
.9
.10
.25

P2

10.0.0.12/30
.13
.14

PE2
.29 .17

lo0,0 Addresses
10.255.1.1
10.255.2.2
10.255.3.3
10.255.4.4
10.255.7.7
10.255.5.5
10.255.6.6

10.0.0.24/30
10.0.0.16/30
.18

.26
10.0.0.20/30

.22

P3

.30
10.0.0.28/30

CE2
AS
64512

g041274

CE1
PE1
P1
P2
P3
PE2
CE2

This example describes the steps on Device P1.

Configuration
CLI Quick
Configuration

Device P1

218

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set protocols mpls interface all
set protocols mpls interface fxp0.0 disable

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

set protocols isis interface all


set protocols isis interface all ldp-synchronization
set protocols isis interface all point-to-point
set protocols isis interface fxp0.0 disable
set protocols ldp interface all
set protocols ldp interface fxp0.0 disable

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure synchronization between IS-IS and LDP:
1.

Enable MPLS on the interfaces


[edit protocols mpls]
user@P1# set interface all
user@P1# set interface fxp0.0 disable

2.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@P1# set interface all
user@P1# set interface fxp0.0 disable

3.

Enable LDP on the interfaces.


[edit protocols ldp]
user@P1# set interface all
user@P1# set interface fxp0.0 disable

4.

Enable LDP synchronization on the IS-IS interfaces.


[edit protocols isis interface all]
user@P1# set ldp-synchronization

5.

Configure the IS-IS interfaces to behave like point-to-point interfaces.


[edit protocols isis interface all]
user@P1# set point-to-point

Results

From configuration mode, confirm your configuration by entering the show protocols
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@P1# show protocols
mpls {
interface all;
interface fxp0.0 {
disable;
}
}
isis {
interface all {
ldp-synchronization;
point-to-point;
}
interface fxp0.0 {

Copyright 2015, Juniper Networks, Inc.

219

IS-IS Feature Guide for Routing Devices

disable;
}
}
ldp {
interface all;
interface fxp0.0 {
disable;
}
}

If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.

Verification
Confirm that the configuration is working properly.

Verifying LDP Synchronization


Purpose
Action

Check LDP synchronization setting on the IS-IS interfaces.


From operational mode, enter the show isis interface extensive command.
user@P1> show isis interface extensive
IS-IS interface database:
lo0.0
Index: 113, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 0, Priority: 64, Metric: 0
Passive
Level 2
Adjacencies: 0, Priority: 64, Metric: 0
Passive
ge-1/2/0.0
Index: 116, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 15 s, Loose Hello padding
Adjacency advertisement: Advertise
LDP sync state: in sync, for: 17:22:06, reason: LDP up during config
config holdtime: infinity
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
ge-1/2/1.0
Index: 114, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 15 s, Loose Hello padding
Adjacency advertisement: Advertise
LDP sync state: in sync, for: 17:22:06, reason: LDP up during config
config holdtime: infinity
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
ge-1/2/2.0
Index: 115, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 15 s, Loose Hello padding
Adjacency advertisement: Advertise
LDP sync state: in sync, for: 17:22:06, reason: LDP up during config
config holdtime: infinity

220

Copyright 2015, Juniper Networks, Inc.

Chapter 8: Configuring IS-IS Traffic Engineering

Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s

Meaning

Related
Documentation

The output shows that LDP is synchronized with IS-IS.

Understanding LDP-IGP Synchronization on page 215

Copyright 2015, Juniper Networks, Inc.

221

IS-IS Feature Guide for Routing Devices

222

Copyright 2015, Juniper Networks, Inc.

CHAPTER 9

Configuring IS-IS Scaling and Throttling

Understanding Link-State PDU Throttling for IS-IS Interfaces on page 223

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 228

Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS


Interfaces on page 229

Understanding IS-IS Mesh Groups on page 233

Example: Configuring Mesh Groups of IS-IS Interfaces on page 234

Understanding Link-State PDU Throttling for IS-IS Interfaces


Link-state PDU throttling by use of the lsp-interval statement is a mechanism to control
the flooding pace to neighboring routing devices to prevent overloading them.
Control traffic (link-state PDU and related packets) might cause delays in user traffic
(information packets) because control traffic always has precedence in terms of
scheduling on the interface cards.
Unfortunately, the control traffic transmission rate does not get lower on low-bandwidth
interfaces such as DS-0 or fractional T1/E1 lines. Control traffic stays the same, regardless
of line bandwidth.
Junos OS does not support automated calculation of link-state PDU throttling based on
available bandwidth because the lowest-speed interface cards on a Juniper Networks
routing device starts at T1/E1 speeds (1.5 and 2 Mbps). It is assumed that even with
link-state PDU pacing of 20 ms, the control traffic will not consume more than half of
the interface bandwidth.
However, there might be fractional T1/E1 circuits (less than the full bandwidth) configured
as well, where link-state PDU pacing might have to be adjusted.
Thus, the lsp-interval statement helps to resolve two issues: regulating the
control-traffic-to-user-traffic ratio, and protecting neighbors during transient situations.
The traffic subject to this pacing is non-self-originated traffic, which is traffic that has
been originated by other routers, not the local router. Junos OS has hard-coded rate
limiting for locally generated link-state PDUs. All the link-state PDUs are paced using a

Copyright 2015, Juniper Networks, Inc.

223

IS-IS Feature Guide for Routing Devices

20 ms timer. Additionally, there is logic that makes sure that the adjacency is reliably up
for some time before advertising the adjacency.
Related
Documentation

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces
This example shows how to modify the link-state PDU interval time.

Requirements on page 224

Overview on page 224

Configuration on page 225

Verification on page 226

Requirements
Before you begin, configure IS-IS. See Example: Configuring IS-IS on page 14 for
information about the sample IS-IS configuration.

Overview
To keep reachability information in the network current, link-state protocols need to
originate, distribute, and revoke or time-out topology information. In IS-IS, topology
information is encoded in link-state PDUs.
By default, the routing device sends one link-state PDU out an interface every
100 milliseconds. To modify this interval, include the lsp-interval statement:
lsp-interval milliseconds;

To disable the transmission of all link-state PDUs, set the interval to 0.


Link-state PDU throttling by use of the lsp-interval statement controls the flooding pace
to neighboring routing devices in order to not overload them and also to ensure that user
traffic is not delayed on low-bandwidth links.
In this example, an IS-IS routing device on a LAN segment is configured to send link-state
PDUs every 1000 milliseconds.
Figure 26 on page 224 shows the topology used in this example.

Figure 26: IS-IS Link-State PDU Interval Topology


10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

This example describes the steps on Device R1.

224

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 description to-R2


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols isis traceoptions file isis-trace
set protocols isis traceoptions flag lsp
set protocols isis interface fe-1/2/0.0 lsp-interval 1000
set protocols isis interface lo0.0

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure the link-state PDU interval:
1.

Configure the interfaces.


[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00

2.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@R1# set interface fe-1/2/0.0
user@R1# set interface lo0.0

3.

Modify the link-state PDU interval.


[edit protocols isis interface fe-1/2/0.0]
user@R1# set lsp-interval 1000

4.

(Optional) Enable tracing for tracking link-state PDU operations.


[edit protocols isis traceoptions]
user@R1# set file isis-trace
user@R1# set flag lsp

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show interfaces
fe-1/2/0 {
unit 0 {
description to-R2;

Copyright 2015, Juniper Networks, Inc.

225

IS-IS Feature Guide for Routing Devices

family inet {
address 10.0.0.1/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
user@R1# show protocols
isis {
traceoptions {
file isis-trace;
flag lsp;
}
interface fe-1/2/0.0 {
lsp-interval 1000;
}
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.

Verification
Confirm that the configuration is working properly.

Verifying the Link-State PDU Interval on page 226

Checking the Link-State PDU Statistics on page 227

Checking the Trace Log on page 227

Verifying the Link-State PDU Interval


Purpose
Action

Check the link-state PDU interval setting on the IS-IS interface.


From operational mode, enter the show isis interface extensive command.
user@R1> show isis interface extensive
fe-1/2/0.0
Index: 70, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 1000 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)
Level 2

226

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

Adjacencies: 1, Priority: 64, Metric: 10


Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)

Meaning

The output shows that the link-state PDU interval is set to 1000 milliseconds.

Checking the Link-State PDU Statistics


Purpose
Action

Check the number of link-state PDUs sent and received.


From operational mode, enter the show isis statistics command.
user@R1> show isis statistics
IS-IS statistics for R1:
PDU type
Received
LSP
24
IIH
2467
CSNP
474
PSNP
0
Unknown
0
Totals
2965

Processed
24
24
474
0
0
522

Drops
0
0
0
0
0
0

Sent
13
836
0
0
0
849

Rexmit
0
0
0
0
0
0

Drops
0
0
0
0
0
0

Sent
24
2459
474
0
0
2957

Rexmit
0
0
0
0
0
0

Total packets received: 2965 Sent: 849


SNP queue length: 0 Drops: 0
LSP queue length: 0 Drops: 0
SPF runs: 14
Fragments rebuilt: 15
LSP regenerations: 6
Purges initiated: 0
user@R2> show isis statistics
IS-IS statistics for R2:
PDU type
Received
LSP
13
IIH
828
CSNP
0
PSNP
0
Unknown
0
Totals
841

Processed
13
15
0
0
0
28

Total packets received: 841 Sent: 2957


SNP queue length: 0 Drops: 0
LSP queue length: 0 Drops: 0
SPF runs: 17
Fragments rebuilt: 26
LSP regenerations: 11
Purges initiated: 0

Meaning

The output shows the number of link-state PDUs sent and received on Device R1 and
Device R2.

Checking the Trace Log


Purpose

Check the IS-IS trace log to view the interval between packets.

Copyright 2015, Juniper Networks, Inc.

227

IS-IS Feature Guide for Routing Devices

Action

From operational mode, enter the show log isis-trace | match lsp command.
user@R1> show log isis | match lsp
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun

Meaning

Related
Documentation

18
18
18
18
18
18
18
18
18
18
18
18

15:27:02.692031
15:27:02.692753
15:27:44.396480
15:27:45.398077
15:28:44.689024
15:28:44.689663
15:29:15.954900
15:29:16.955620
15:29:28.789986
15:29:28.790620
15:30:27.727892
15:30:27.728519

Received L1 LSP R2.00-00, on interface fe-1/2/0.0


Updating L1 LSP R2.00-00 in TED
Updating L1 LSP R1.00-00 in TED
Sending L1 LSP R1.00-00 on interface fe-1/2/0.0
Received L1 LSP R2.02-00, on interface fe-1/2/0.0
Updating L1 LSP R2.02-00 in TED
Updating L2 LSP R1.00-00 in TED
Sending L2 LSP R1.00-00 on interface fe-1/2/0.0
Received L2 LSP R2.00-00, on interface fe-1/2/0.0
Updating L2 LSP R2.00-00 in TED
Received L2 LSP R2.02-00, on interface fe-1/2/0.0
Updating L2 LSP R2.02-00 in TED

The output shows that Level 1 and Level 2 link-state PDUs are being sent and received
roughly every 1000 milliseconds (1 second).

Understanding Link-State PDU Throttling for IS-IS Interfaces on page 223

Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
on page 229

Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces


The complete sequence number PDU (CSNP) interval controls the frequency at which
a routing device sends a directory of its link-state database.
When IS-IS is activated on a routing devices interface, the device first sends some IS-IS
hello packets (IIHs) to its neighbors to ensure that the circuit is capable of transporting
packets in both directions. In the IIHs, the router embeds information about the designated
router (also called the designated intermediate system or DIS). One of the designated
router roles on an IS-IS broadcast circuit is to synchronize the link-state databases on
LANs. The designated router does this by periodically sending a directory of its link-state
database, which is received by all the routing devices on a LAN.
If the routing device is the designated router on a LAN, IS-IS sends CSNPs every
10 seconds. If the routing device is on a point-to-point interface, it sends CSNPs every
5 seconds. The general recommendation is to use the default values or to increase the
CSNP interval if there are a large number of broadcast circuits that need to be supplied
with fresh CSNPs. Increasing the interval can help protect against CSNP flooding.
Related
Documentation

228

Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
on page 229

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
This example shows how to modify the complete sequence number PDU (CSNP) interval
on IS-IS interfaces.

Requirements on page 229

Overview on page 229

Configuration on page 230

Verification on page 231

Requirements
Before you begin, configure IS-IS. See Example: Configuring IS-IS on page 14 for
information about the sample IS-IS configuration.

Overview
CSNPs contain a complete list of all link-state PDUs in the IS-IS database. CSNPs are
sent periodically on all links, and the receiving systems use the information in the CSNP
to update and synchronize their link-state PDU databases. The designated router
multicasts CSNPs on broadcast links in place of sending explicit acknowledgments for
each link-state PDU.
If the routing device is the designated router on a LAN, IS-IS sends CSNPs every
10 seconds. If the routing device is on a point-to-point interface, it sends CSNPs every
5 seconds. You might want to modify the default interval to protect against CSNP flooding.
To modify the CSNP interval, include the csnp-interval statement:
csnp-interval seconds;

The time can range from 1 through 65,535 seconds.


To configure the interface not to send any CSNPs, specify the disable option:
csnp-interval disable;

In this example, an IS-IS routing device on a LAN segment is configured to send CSNPs
every 30 seconds.
Figure 26 on page 224 shows the topology used in this example.

Figure 27: IS-IS CSNP Interval Topology


10.0.0.0/30

.2

R1

R2

lo0:192.168.0.1

lo0:192.168.0.2

g041282

.1

This example describes the steps on Device R1.

Copyright 2015, Juniper Networks, Inc.

229

IS-IS Feature Guide for Routing Devices

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

Step-by-Step
Procedure

set interfaces fe-1/2/0 unit 0 description to-R2


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols isis traceoptions file isis-trace
set protocols isis traceoptions flag csn
set protocols isis interface fe-1/2/0.0 csnp-interval 30
set protocols isis interface lo0.0

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure the CSNP interval:
1.

Configure the interfaces.


[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00

2.

Enable IS-IS on the interfaces.


[edit protocols isis]
user@R1# set interface fe-1/2/0.0
user@R1# set interface lo0.0

3.

Modify the CSNP interval.


[edit protocols isis interface fe-1/2/0.0]
user@R1# set csnp-interval 30

4.

(Optional) Enable tracing for tracking CSNP operations.


[edit protocols isis traceoptions]
user@R1# set file isis-trace
user@R1# set flag csn

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show interfaces
fe-1/2/0 {
unit 0 {
description to-R2;

230

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

family inet {
address 10.0.0.1/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
user@R1# show protocols
isis {
traceoptions {
file isis-trace;
flag csn;
}
interface fe-1/2/0.0 {
csnp-interval 30;
}
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode. Repeat
the configuration on Device R2.

Verification
Confirm that the configuration is working properly.

Verifying the CSNP Interval on page 231

Checking the CSNP Statistics on page 232

Checking the IS-IS Log on page 233

Verifying the CSNP Interval


Purpose
Action

Check the CSNP interval setting on the IS-IS interface.


From operational mode, enter the show isis interface extensive command.
user@R1> show isis interface extensive
IS-IS interface database:
fe-1/2/0.0
Index: 70, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 30 s, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)

Copyright 2015, Juniper Networks, Inc.

231

IS-IS Feature Guide for Routing Devices

Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: R2.02 (not us)

Meaning

The output shows that the CSNP interval is set to 30 seconds.

Checking the CSNP Statistics


Purpose
Action

Checking the number of CSNPs sent and received.


From operational mode, enter the show isis statistics command.
user@R1> show isis statistics
IS-IS statistics for R1:
PDU type
Received
LSP
5
IIH
94
CSNP
6
PSNP
0
Unknown
0
Totals
105

Processed
5
20
6
0
0
31

Drops
0
0
0
0
0
0

Sent
3
43
0
0
0
46

Rexmit
0
0
0
0
0
0

Drops
0
0
0
0
0
0

Sent
5
86
6
0
0
97

Rexmit
0
0
0
0
0
0

Total packets received: 105 Sent: 46


SNP queue length: 0 Drops: 0
LSP queue length: 0 Drops: 0
SPF runs: 5
Fragments rebuilt: 5
LSP regenerations: 0
Purges initiated: 0
----user@R2> show isis statistics
IS-IS statistics for R2:
PDU type
Received
LSP
3
IIH
35
CSNP
0
PSNP
0
Unknown
0
Totals
38

Processed
3
11
0
0
0
14

Total packets received: 38 Sent: 97


SNP queue length: 0 Drops: 0
LSP queue length: 0 Drops: 0
SPF runs: 7
Fragments rebuilt: 7
LSP regenerations: 0
Purges initiated: 0

Meaning

232

The output shows the number of CSNPs sent and received on Device R1 and Device R2.

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

NOTE: On broadcast links, only the designated intermediate system (DIS)


sends CSNPs.

Checking the IS-IS Log


Purpose
Action

Check the IS-IS trace log to view the interval between packets.
From operational mode, enter the show log isis-trace | match csn command.
user@R1> show log isis-trace | match csn
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun

Meaning

Related
Documentation

18
18
18
18
18
18
18
18

14:36:19.504064
14:36:19.523065
14:36:48.904120
14:36:48.916425
14:37:14.954447
14:37:14.971329
14:37:44.227106
14:37:44.244181

Received
Received
Received
Received
Received
Received
Received
Received

L1
L2
L1
L2
L1
L2
L1
L2

CSN,
CSN,
CSN,
CSN,
CSN,
CSN,
CSN,
CSN,

source
source
source
source
source
source
source
source

R2,
R2,
R2,
R2,
R2,
R2,
R2,
R2,

interface
interface
interface
interface
interface
interface
interface
interface

fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0
fe-1/2/0.0

The output shows that Level 1 and Level 2 CSNPs are being received roughly every 30
seconds.

Understanding the Transmission Frequency for CSNPs on IS-IS Interfaces on page 228

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Understanding IS-IS Mesh Groups


A mesh group is a set of routing devices that are fully connected. That is, they have a fully
meshed topology.
Junos OS supports IS-IS mesh groups as documented in RFC 2973, IS-IS Mesh Groups.
When link-state PDUs are being flooded throughout an area, each router within a mesh
group receives only a single copy of a link-state PDU instead of receiving one copy from
each neighbor, thus minimizing the overhead associated with the flooding of link-state
PDUs.
Mesh groups provide a scaling method for the flooding subsystem. We recommend that
you deploy mesh groups when your network design has a dense flooding topology. For
example, consider the classical overlay topologies of the 1990s where 200 routers were
fully meshed using permanent virtual circuits (PVCs) over an ATM core, because ATM
was the only high-speed technology at the time. A PVC is a software-defined logical
connection in a network such as a Frame Relay network.
What has changed since the 1990s is that IP and MPLS technology have reduced the
ATM layer and removed the need for overlay meshing. The flooding graphs have become

Copyright 2015, Juniper Networks, Inc.

233

IS-IS Feature Guide for Routing Devices

sparse in almost all practical deployments. In service provider networks, overlay networks
are no longer used.
In enterprise networks, dense flooding graphs that, for example, lease a Layer 2 VPN
service (an overlay network) to fully mesh its WAN routers might continue to be a useful
architecture. In such cases, mesh groups might be useful.
Related
Documentation

Example: Configuring Mesh Groups of IS-IS Interfaces on page 234

Example: Configuring Mesh Groups of IS-IS Interfaces


This example shows how to configure mesh groups of IS-IS interfaces.

Requirements on page 234

Overview on page 234

Configuration on page 235

Verification on page 238

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
When link-state PDUs are being flooded throughout an area, each router within a mesh
group receives only a single copy of a link-state PDU instead of receiving one copy from
each neighbor, thus minimizing the overhead associated with the flooding of link-state
PDUs.
To create a mesh group and designate that an interface be part of the group, assign a
mesh-group number to all the routing device interfaces in the group:
mesh-group value;

To prevent an interface in the mesh group from flooding link-state PDUs, configure
blocking on that interface:
mesh-group blocked;

Figure 28 on page 235 shows the topology used in this example.

234

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

Figure 28: IS-IS Mesh Topology

g041287

10.0.0.0/30
fe-1/2/0
fe-1/2/0
.1
.2
R1 .5
.14 R2
fe-1/2/1
fe-1/2/1
fe-1/2/2 .9
.21 fe-1/2/2
10.0.0.4/30
10.0.0.8/30
10.0.0.20/30
10.0.0.12/30
fe-1/2/0 .10
.22 fe-1/2/2
fe-1/2/0
fe-1/2/1
.6
.13
R3
R4
.17
.18
fe-1/2/2
fe-1/2/1
10.0.0.16/30

CLI Quick Configuration on page 235 shows the configuration for all of the devices in
Figure 28 on page 235. The section Step-by-Step Procedure on page 236 describes the
steps on Device R1.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.

Device R1

set interfaces fe-1/2/0 unit 0 description to-R2


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.1/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R4
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.5/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R3
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.9/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.1/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0001.00
set protocols isis interface fe-1/2/0.0 mesh-group 1
set protocols isis interface fe-1/2/1.0 mesh-group 1
set protocols isis interface fe-1/2/2.0 mesh-group 1
set protocols isis interface lo0.0

Device R2

set interfaces fe-1/2/0 unit 0 description to-R1


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.2/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R1
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.14/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R1
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.21/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.2/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0002.00
set protocols isis interface fe-1/2/0.2 mesh-group 1
set protocols isis interface fe-1/2/1.0 mesh-group 1
set protocols isis interface fe-1/2/2.0 mesh-group 1
set protocols isis interface lo0.0

Copyright 2015, Juniper Networks, Inc.

235

IS-IS Feature Guide for Routing Devices

Device R3

set interfaces fe-1/2/0 unit 0 description to-R1


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.10/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R2
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.13/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R4
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.17/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.3/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0003.00
set protocols isis interface fe-1/2/0.0 mesh-group 1
set protocols isis interface fe-1/2/1.0 mesh-group 1
set protocols isis interface fe-1/2/2.0 mesh-group 1
set protocols isis interface lo0.0

Device R4

set interfaces fe-1/2/0 unit 0 description to-R1


set interfaces fe-1/2/0 unit 0 family inet address 10.0.0.6/30
set interfaces fe-1/2/0 unit 0 family iso
set interfaces fe-1/2/1 unit 0 description to-R3
set interfaces fe-1/2/1 unit 0 family inet address 10.0.0.18/30
set interfaces fe-1/2/1 unit 0 family iso
set interfaces fe-1/2/2 unit 0 description to-R2
set interfaces fe-1/2/2 unit 0 family inet address 10.0.0.22/30
set interfaces fe-1/2/2 unit 0 family iso
set interfaces lo0 unit 0 family inet address 192.168.0.4/32
set interfaces lo0 unit 0 family iso address 49.0002.0192.0168.0004.00
set protocols isis interface fe-1/2/0.0 mesh-group 1
set protocols isis interface fe-1/2/1.0 mesh-group 1
set protocols isis interface fe-1/2/2.0 mesh-group 1
set protocols isis interface lo0.0

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure an IS-IS mesh group:
1.

Configure the interfaces.


[edit interfaces]
user@R1# set fe-1/2/0 unit 0 description to-R2
user@R1# set fe-1/2/0 unit 0 family inet address 10.0.0.1/30
user@R1# set fe-1/2/0 unit 0 family iso
user@R1# set fe-1/2/1 unit 0 description to-R4
user@R1# set fe-1/2/1 unit 0 family inet address 10.0.0.5/30
user@R1# set fe-1/2/1 unit 0 family iso
user@R1# set fe-1/2/2 unit 0 description to-R3
user@R1# set fe-1/2/2 unit 0 family inet address 10.0.0.9/30
user@R1# set fe-1/2/2 unit 0 family iso
user@R1# set lo0 unit 0 family inet address 192.168.0.1/32
user@R1# set lo0 unit 0 family iso address 49.0002.0192.0168.0001.00

2.

Enable IS-IS on the interfaces, and assign a mesh group number.


[edit protocols isis]

236

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

user@R1# set interface fe-1/2/0.0 mesh-group 1


user@R1# set interface fe-1/2/1.0 mesh-group 1
user@R1# set interface fe-1/2/2.0 mesh-group 1
user@R1# set interface lo0.0

Results

From configuration mode, confirm your configuration by entering the show interfaces and
show protocols commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
user@R1# show interfaces
fe-1/2/0 {
unit 0 {
description to-R2;
family inet {
address 10.0.0.1/30;
}
family iso;
}
}
fe-1/2/1 {
unit 0 {
description to-R4;
family inet {
address 10.0.0.5/30;
}
family iso;
}
}
fe-1/2/2 {
unit 0 {
description to-R3;
family inet {
address 10.0.0.9/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.1/32;
}
family iso {
address 49.0002.0192.0168.0001.00;
}
}
}
user@R1# show protocols
isis {
interface fe-1/2/0.0 {
mesh-group 1;
}
interface fe-1/2/1.0 {
mesh-group 1;

Copyright 2015, Juniper Networks, Inc.

237

IS-IS Feature Guide for Routing Devices

}
interface fe-1/2/2.0 {
mesh-group 1;
}
interface lo0.0;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Checking the Interface Mesh Group on page 238

Checking the IS-IS Statistics on page 239

Checking the Interface Mesh Group


Purpose
Action

Verify that the mesh group is enabled on the IS-IS interfaces.


From operational mode, enter the show isis interface extensive command.
user@R1> show isis interface extensive
IS-IS interface database:
lo0.0
Index: 68, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 0, Priority: 64, Metric: 0
Passive
Level 2
Adjacencies: 0, Priority: 64, Metric: 0
Passive
fe-1/2/0.1
Index: 73, State: 0x206, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
CSNP interval: disabled, Mesh group: 1
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R2.03 (not us)
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R2.03 (not us)
fe-1/2/1.0
Index: 75, State: 0x206, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
CSNP interval: disabled, Mesh group: 1
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R4.03 (not us)
Level 2

238

Copyright 2015, Juniper Networks, Inc.

Chapter 9: Configuring IS-IS Scaling and Throttling

Adjacencies: 1, Priority: 64, Metric: 10


Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R4.03 (not us)
fe-1/2/2.0
Index: 76, State: 0x206, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
CSNP interval: disabled, Mesh group: 1
Level 1
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R3.02 (not us)
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 9.000 s, Hold Time: 27 s
Designated Router: tp5-R3.02 (not us)

Meaning

Mesh group: 1 in the output shows that the mesh group is enabled as expected.

Checking the IS-IS Statistics


Purpose

Action

Verify that the number of link-state PDUs received and sent is less than what it would
be if the mesh group were not enabled.
From operational mode, enter the show isis statistics command.
user@R1> show isis statistics
IS-IS statistics for tp5-R1:
PDU type
Received
Processed
LSP
73
73
IIH
4463
85
CSNP
1294
1294
PSNP
0
0
Unknown
0
0
Totals
5830
1452

Drops
0
0
0
0
0
0

Sent
37
1525
0
2
0
1564

Rexmit
0
0
0
0
0
0

Total packets received: 5830 Sent: 1564


SNP queue length: 0 Drops: 0
LSP queue length: 0 Drops: 0
SPF runs: 26
Fragments rebuilt: 15
LSP regenerations: 4
Purges initiated: 0

Meaning

Related
Documentation

After the adjacencies have been up for about 38 minutes, the output shows that Device
R1 has received 73 link-state PDUs and sent 37 link-state PDUs. In the same topology in
the same amount of time without the mesh group enabled, Device R1 would have received
roughly 156 link-state PDUs and sent roughly 117 link-state PDUs.

Understanding IS-IS Mesh Groups on page 233

Copyright 2015, Juniper Networks, Inc.

239

IS-IS Feature Guide for Routing Devices

240

Copyright 2015, Juniper Networks, Inc.

CHAPTER 10

Configuring IS-IS CLNS

Understanding IS-IS for CLNS on page 241

Example: Configuring IS-IS for CLNS on page 241

Understanding IS-IS for CLNS


IS-IS extensions provide the basic interior gateway protocol (IGP) support for collecting
intradomain routing information for Connectionless Network Service (CLNS) destinations
within a CLNS network. Routers that learn host addresses through End
System-to-Intermediate System (ES-IS) can advertise the addresses to other routers
(intermediate systems) by using IS-IS.
For more information about IS-IS, see the ISO 10589 standard.
Related
Documentation

CLNS Overview

Example: Configuring IS-IS for CLNS on page 241

Example: Configuring IS-IS for CLNS


This example shows how to create a routing instance and enable the IS-IS protocol on
all interfaces within a Connectionless Network Service (CLNS) network.

Requirements on page 241

Overview on page 241

Configuration on page 242

Verification on page 243

Requirements
Before you begin, configure the network interfaces. See the Junos OS Interfaces
Configuration Guide for Security Devices.

Overview
The configuration instructions in this topic describe how to create a routing instance
called aaaa, enable IS-IS on all interfaces, define the BGP export policy name (dist-bgp),
family (ISO), and protocol (BGP), and apply the export policy to IS-IS.

Copyright 2015, Juniper Networks, Inc.

241

IS-IS Feature Guide for Routing Devices

NOTE: CLNS routing is not supported on aggregated Ethernet interfaces.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set routing-instances aaaa protocols isis clns-routing
set routing-instances aaaa protocols isis interface all
set routing-instances aaaa protocols isis no-ipv4-routing no-ipv6-routing
set policy-options policy-statement dist-bgp from family iso protocol bgp
set policy-options policy-statement dist-bgp then accept
set routing-instances aaaa protocols isis export dist-bgp

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS for CLNS:
1.

Enable CLNS routing.


[edit routing-instances aaaa]
user@host# set protocols isis clns-routing

2.

Enable IS-IS on all interfaces.


[edit routing-instances aaaa]
user@host# set protocols isis interface all

3.

(Optional) Disable IPv4 and IPv6 routing to configure a pure CLNS network.
[edit routing-instances aaaa]
user@host# set protocols isis no-ipv4-routing no-ipv6-routing

4.

Define the BGP export policy name, family, and protocol.


[edit policy-options]
user@host# set policy-statement dist-bgp from family iso protocol bgp

5.

Define the action for the export policy.


[edit policy-options]
user@host# set policy-statement dist-bgp then accept

6.

Apply the export policy to IS-IS.


[edit routing-instances aaaa]
user@host# set protocols isis export dist-bgp

Results

242

From configuration mode, confirm your configuration by entering the show


routing-instances and show policy-options commands. If the output does not display the
intended configuration, repeat the instructions in this example to correct the configuration.

Copyright 2015, Juniper Networks, Inc.

Chapter 10: Configuring IS-IS CLNS

user@host# show routing-instances


aaaa {
protocols {
isis {
export dist-bgp;
no-ipv4-routing;
no-ipv6-routing;
clns-routing;
interface all;
}
user@host# show policy-options
policy-statement dist-bgp {
from {
family iso;
protocol bgp;
}
then accept;
}

If you are done configuring the device, enter commit from configuration mode.

Verification
Confirm that the configuration is working properly.

Verifying the ISO Routes on page 243

Checking the SPF Calculations on page 243

Verifying the ISO Routes


Purpose
Action

Verify that the expected ISO routes are displayed in the IS-IS routing table.
From operational mode, enter the show isis route command.

Checking the SPF Calculations


Purpose
Action

Related
Documentation

Display information about IS-IS shortest-path-first (SPF) calculations.


From operational mode, enter the show isis spf command.

CLNS Configuration Overview

Understanding IS-IS for CLNS on page 241

Verifying a CLNS VPN Configuration

Copyright 2015, Juniper Networks, Inc.

243

IS-IS Feature Guide for Routing Devices

244

Copyright 2015, Juniper Networks, Inc.

CHAPTER 11

Configuring IS-IS on Logical Systems

Introduction to Logical Systems on page 245

Example: Configuring IS-IS on Logical Systems Within the Same Router on page 247

Understanding Default Routes on page 256

Example: Configuring an IS-IS Default Route Policy on Logical Systems on page 257

Introduction to Logical Systems


For many years, engineers have combined power supplies, routing hardware and software,
forwarding hardware and software, and physical interfaces into a networking device
known as a router. Networking vendors have created large routers and small routers, but
all routers have been placed into service as individual devices. As a result, the router has
been considered a single physical device for most of its history.

The concept of logical systems breaks with this tradition. With the Junos operating
system (Junos OS), you can partition a single router into multiple logical devices that
perform independent routing tasks. Because logical systems perform a subset of the
tasks once handled by the main router, logical systems offer an effective way to maximize
the use of a single routing or switching platform.

NOTE: Beginning with Junos OS Release 9.3, the logical router feature has
been renamed logical system.
All configuration statements, operational commands, show command output,
error messages, log messages, and SNMP MIB objects that contain the string
logical-router have been changed to logical-system.

Traditionally, service provider network design requires multiple layers of switches and
routers. These devices transport packet traffic between customers. As seen on the left
side of Figure 29 on page 246, access devices are connected to edge devices, which are
in turn connected to core devices.
However, this complexity can lead to challenges in maintenance, configuration, and
operation. To reduce such complexity, Juniper Networks supports logical systems. Logical
systems perform a subset of the actions of the main router and have their own unique
routing tables, interfaces, policies, and routing instances. As shown on the right side of

Copyright 2015, Juniper Networks, Inc.

245

IS-IS Feature Guide for Routing Devices

Figure 29 on page 246, a set of logical systems within a single router can handle the
functions previously performed by several small routers.

Figure 29: Logical Systems Concepts


Network topology without logical systems
(eight separate physical devices)

Network topology with logical systems


(one physical router with eight logical devices)

g016932

Router 1

Figure 30 on page 246 shows the Junos OS architecture without logical systems configured.
Figure 31 on page 247 shows the Junos OS architecture when logical systems are configured.
Note that each logical system runs its own routing protocol process (rpd).

Figure 30: Junos OS Without Logical Systems

Routing Tables
Family: y
Family: x
Family: inet

CLI

Routing
Protocol
Process

Forwarding
Table

Forwarding
Table

Packet
Forwarding
Engine

246

MGD

Interface
Process

Chassis
Process

Kernel

Interface
Process

Distributed
ASICs

Microkernel

Chassis
Process

g040563

Routing
Engine

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

Figure 31: Junos OS with Logical Systems


Routing
Engine

CLI

Irmuxd
RPD
Main

RPD
LS1

Family: y
Family: x
Family: inet

RPD
LSn

LS1/Family: y
LS1/Family: x
LS1/Family: inet

Kernel

Distributed
ASICs

Interface
Process

Packet
Forwarding
Engine

Related
Documentation

Chassis
Process

LSn/Family: y
LSn/Family: x
LSn/Family: inet

Forwarding
Table

Forwarding
Table

Interface
Process

Microkernel

Logical Systems Operations and Restrictions

Junos OS Features That Are Supported on Logical Systems

Chassis
Process

g040564

Routing Tables

MGD

Example: Configuring IS-IS on Logical Systems Within the Same Router


This example shows how to configure an IS-IS network by using multiple logical systems
that are running on a single physical router. The logical systems are connected by logical
tunnel interfaces.

Requirements on page 247

Overview on page 247

Configuration on page 248

Verification on page 253

Requirements
You must connect the logical systems by using logical tunnel (lt) interfaces. See Example:
Connecting Logical Systems Within the Same Router Using Logical Tunnel Interfaces.

Overview
This example shows an IS-IS configuration with three logical systems running on one
physical router. Each logical system has its own routing table. The configuration enables
the protocol on all logical tunnel interfaces that participate in the IS-IS domain.
Figure 32 on page 248 shows the sample network.

Copyright 2015, Juniper Networks, Inc.

247

IS-IS Feature Guide for Routing Devices

Figure 32: IS-IS on Logical Systems

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set logical-systems LS1 interfaces lt-0/1/0 unit 2 description LS1->LS2
set logical-systems LS1 interfaces lt-0/1/0 unit 2 encapsulation ethernet
set logical-systems LS1 interfaces lt-0/1/0 unit 2 peer-unit 1
set logical-systems LS1 interfaces lt-0/1/0 unit 2 family inet address 10.0.0.1/30
set logical-systems LS1 interfaces lt-0/1/0 unit 2 family iso
set logical-systems LS1 interfaces lt-0/1/0 unit 0 description LS1->LS3
set logical-systems LS1 interfaces lt-0/1/0 unit 0 encapsulation ethernet
set logical-systems LS1 interfaces lt-0/1/0 unit 0 peer-unit 5
set logical-systems LS1 interfaces lt-0/1/0 unit 0 family inet address 10.0.1.2/30
set logical-systems LS1 interfaces lt-0/1/0 unit 0 family iso
set logical-systems LS1 interfaces lo0 unit 1 family iso address 49.0001.1720.1600.1001.00
set logical-systems LS1 protocols isis interface lt-0/1/0.0
set logical-systems LS1 protocols isis interface lt-0/1/0.2
set logical-systems LS1 protocols isis interface lo0.1 passive
set logical-systems LS2 interfaces lt-0/1/0 unit 1 description LS2->LS1
set logical-systems LS2 interfaces lt-0/1/0 unit 1 encapsulation ethernet
set logical-systems LS2 interfaces lt-0/1/0 unit 1 peer-unit 2
set logical-systems LS2 interfaces lt-0/1/0 unit 1 family inet address 10.0.0.2/30
set logical-systems LS2 interfaces lt-0/1/0 unit 1 family iso
set logical-systems LS2 interfaces lt-0/1/0 unit 4 description LS2->LS3
set logical-systems LS2 interfaces lt-0/1/0 unit 4 encapsulation ethernet
set logical-systems LS2 interfaces lt-0/1/0 unit 4 peer-unit 3
set logical-systems LS2 interfaces lt-0/1/0 unit 4 family inet address 10.0.2.2/30
set logical-systems LS2 interfaces lt-0/1/0 unit 4 family iso

248

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

set logical-systems LS2 interfaces lo0 unit 2 family iso address


49.0001.1720.1600.2002.00
set logical-systems LS2 protocols isis interface lt-0/1/0.1
set logical-systems LS2 protocols isis interface lt-0/1/0.4
set logical-systems LS2 protocols isis interface lo0.2 passive
set logical-systems LS3 interfaces lt-0/1/0 unit 3 description LS3->LS2
set logical-systems LS3 interfaces lt-0/1/0 unit 3 encapsulation ethernet
set logical-systems LS3 interfaces lt-0/1/0 unit 3 peer-unit 4
set logical-systems LS3 interfaces lt-0/1/0 unit 3 family inet address 10.0.2.1/30
set logical-systems LS3 interfaces lt-0/1/0 unit 3 family iso
set logical-systems LS3 interfaces lt-0/1/0 unit 5 description LS3->LS1
set logical-systems LS3 interfaces lt-0/1/0 unit 5 encapsulation ethernet
set logical-systems LS3 interfaces lt-0/1/0 unit 5 peer-unit 0
set logical-systems LS3 interfaces lt-0/1/0 unit 5 family inet address 10.0.1.1/30
set logical-systems LS3 interfaces lt-0/1/0 unit 5 family iso
set logical-systems LS3 interfaces lo0 unit 3 family iso address 49.0001.1234.1600.2231.00
set logical-systems LS3 protocols isis interface lt-0/1/0.5
set logical-systems LS3 protocols isis interface lt-0/1/0.3
set logical-systems LS3 protocols isis interface lo0.3 passive

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure IS-IS on logical systems:
1.

Configure the logical tunnel interface on Logical System LS1 connecting to Logical
System LS2.
[edit logical-systems LS1]
user@host# set interfaces lt-0/1/0 unit 2 description LS1->LS2
user@host# set interfaces lt-0/1/0 unit 2 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 2 peer-unit 1
user@host# set interfaces lt-0/1/0 unit 2 family inet address 10.0.0.1/30
user@host# set interfaces lt-0/1/0 unit 2 family iso

2.

Configure the logical tunnel interface on Logical System LS1 connecting to Logical
System LS3.
[edit logical-systems LS1]
user@host# set interfaces lt-0/1/0 unit 0 description LS1->LS3
user@host# set interfaces lt-0/1/0 unit 0 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 0 peer-unit 5
user@host# set interfaces lt-0/1/0 unit 0 family inet address 10.0.1.2/30
user@host# set interfaces lt-0/1/0 unit 0 family iso

3.

Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS1.
[edit logical-systems LS2]
user@host# set interfaces lt-0/1/0 unit 1 description LS2->LS1
user@host# set interfaces lt-0/1/0 unit 1 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 1 peer-unit 2
user@host# set interfaces lt-0/1/0 unit 1 family inet address 10.0.0.2/30
user@host# set interfaces lt-0/1/0 unit 1 family iso

Copyright 2015, Juniper Networks, Inc.

249

IS-IS Feature Guide for Routing Devices

4.

Configure the logical tunnel interface on Logical System LS2 connecting to Logical
System LS3.
[edit logical-systems LS2]
user@host# set interfaces lt-0/1/0 unit 4 description LS2->LS3
user@host# set interfaces lt-0/1/0 unit 4 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 4 peer-unit 3
user@host# set interfaces lt-0/1/0 unit 4 family inet address 10.0.2.2/30
user@host# set interfaces lt-0/1/0 unit 4 family iso

5.

Configure the logical tunnel interface on Logical System LS3 connecting to Logical
System LS2.
[edit logical-systems LS3]
user@host# set interfaces lt-0/1/0 unit 3 description LS3->LS2
user@host# set interfaces lt-0/1/0 unit 3 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 3 peer-unit 4
user@host# set interfaces lt-0/1/0 unit 3 family inet address 10.0.2.1/30
user@host# set interfaces lt-0/1/0 unit 3 family iso

6.

Configure the logical tunnel interface on Logical System LS3 connecting to Logical
System LS1.
[edit logical-systems LS3]
user@host# set interfaces lt-0/1/0 unit 5 description LS3->LS1
user@host# set interfaces lt-0/1/0 unit 5 encapsulation ethernet
user@host# set interfaces lt-0/1/0 unit 5 peer-unit 0
user@host# set interfaces lt-0/1/0 unit 5 family inet address 10.0.1.1/30
user@host# set interfaces lt-0/1/0 unit 5 family iso

7.

Configure the ISO address on the loopback interface for the three logical systems.
[edit logical-systems LS1]
user@host# set interfaces lo0 unit 1 family iso address 49.0001.1720.1600.1001.00
user@host# set protocols isis interface lo0.1 passive
[edit logical-systems LS2]
user@host# set interfaces lo0 unit 2 family iso address 49.0001.1720.1600.2002.00
user@host# set protocols isis interface lo0.2 passive
[edit logical-systems LS3]
user@host# set interfaces lo0 unit 3 family iso address 49.0001.1234.1600.2231.00
user@host# set protocols isis interface lo0.3 passive

8.

Configure IS-IS on all the interfaces.


[edit logical-systems LS1 protocols isis]
user@host# set interface lt-0/1/0.0
user@host# set interface lt-0/1/0.2
[edit logical-systems LS2 protocols isis]
user@host# set interface lt-0/1/0.1
user@host# set interface lt-0/1/0.4
[edit logical-systems LS3 protocols isis]
user@host# set interface lt-0/1/0.5
user@host# set interface lt-0/1/0.3

9.

If you are done configuring the device, commit the configuration.


[edit]

250

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

user@host# commit

Results
From configuration mode, confirm your configuration by issuing the show logical-systems
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@host# show logical-systems
LS1 {
interfaces {
lt-0/1/0 {
unit 0 {
description LS1->LS3;
encapsulation ethernet;
peer-unit 5;
family inet {
address 10.0.1.2/30;
}
family iso;
}
unit 2 {
description LS1->LS2;
encapsulation ethernet;
peer-unit 1;
family inet {
address 10.0.0.1/30;
}
family iso;
}
}
lo0 {
unit 1 {
family iso {
address 49.0001.1720.1600.1001.00;
}
}
}
}
protocols {
isis {
interface lt-0/1/0.0;
interface lt-0/1/0.2;
interface lo0.1 {
passive;
}
}
}
}
LS2 {
interfaces {
lt-0/1/0 {
unit 1 {
description LS2->LS1;
encapsulation ethernet;
peer-unit 2;
family inet {
address 10.0.0.2/30;
}
family iso;

Copyright 2015, Juniper Networks, Inc.

251

IS-IS Feature Guide for Routing Devices

}
unit 4 {
description LS2->LS3;
encapsulation ethernet;
peer-unit 3;
family inet {
address 10.0.2.2/30;
}
family iso;
}
}
lo0 {
unit 2 {
family iso {
address 49.0001.1720.1600.2002.00;
}
}
}
}
protocols {
isis {
interface lt-0/1/0.1;
interface lt-0/1/0.4;
interface lo0.2 {
passive;
}
}
}
}
LS3 {
interfaces {
lt-0/1/0 {
unit 3 {
description LS3->LS2;
encapsulation ethernet;
peer-unit 4;
family inet {
address 10.0.2.1/30;
}
family iso;
}
unit 5 {
description LS3->LS1;
encapsulation ethernet;
peer-unit 0;
family inet {
address 10.0.1.1/30;
}
family iso;
}
}
lo0 {
unit 3 {
family iso {
address 49.0001.1234.1600.2231.00;
}
}
}
}
protocols {

252

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

isis {
interface lt-0/1/0.3;
interface lt-0/1/0.5;
interface lo0.3 {
passive;
}
}
}
}

Verification
Confirm that the configuration is working properly.

Verifying That the Logical Systems Are Up on page 253

Verifying Connectivity Between the Logical Systems on page 253

Verifying That the Logical Systems Are Up


Purpose

Action

Make sure that the interfaces are properly configured.

user@host> show interfaces terse


Interface
Admin Link Proto
...
lt-0/1/0
up
up
lt-0/1/0.0
up
up
inet
iso
lt-0/1/0.1
up
up
inet
iso
lt-0/1/0.2
up
up
inet
iso
lt-0/1/0.3
up
up
inet
iso
lt-0/1/0.4
up
up
inet
iso
lt-0/1/0.5
up
up
inet
iso
...

Local

Remote

10.0.1.2/30
10.0.0.2/30
10.0.0.1/30
10.0.2.1/30
10.0.2.2/30
10.0.1.1/30

Verifying Connectivity Between the Logical Systems


Purpose

Make sure that the IS-IS adjacencies are established by checking the logical system
routing entries and by pinging the logical systems.

Copyright 2015, Juniper Networks, Inc.

253

IS-IS Feature Guide for Routing Devices

Action

user@host> show route logical-system LS1


inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.0/30
10.0.0.1/32
10.0.1.0/30
10.0.1.2/32
10.0.2.0/30

*[Direct/0] 3w0d 01:37:52


> via lt-0/1/0.2
*[Local/0] 3w0d 01:37:52
Local via lt-0/1/0.2
*[Direct/0] 3w0d 01:37:52
> via lt-0/1/0.0
*[Local/0] 3w0d 01:37:52
Local via lt-0/1/0.0
*[IS-IS/15] 3w0d 01:37:13, metric 20
> to 10.0.1.1 via lt-0/1/0.0
to 10.0.0.2 via lt-0/1/0.2

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1720.1600.1001/72
*[Direct/0] 3w0d 01:37:52
> via lo0.1

user@host> show route logical-system LS2


inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.0/30
10.0.0.2/32
10.0.1.0/30

10.0.2.0/30
10.0.2.2/32

*[Direct/0] 3w0d 01:38:01


> via lt-0/1/0.1
*[Local/0] 3w0d 01:38:01
Local via lt-0/1/0.1
*[IS-IS/15] 3w0d 01:37:01, metric 20
to 10.0.0.1 via lt-0/1/0.1
> to 10.0.2.1 via lt-0/1/0.4
*[Direct/0] 3w0d 01:38:01
> via lt-0/1/0.4
*[Local/0] 3w0d 01:38:01
Local via lt-0/1/0.4

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1720.1600.2002/72
*[Direct/0] 3w0d 01:38:01
> via lo0.2
user@host> show route logical-system LS3
inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.0/30

10.0.1.0/30
10.0.1.1/32
10.0.2.0/30

254

*[IS-IS/15] 3w0d 01:37:10, metric 20


to 10.0.2.2 via lt-0/1/0.3
> to 10.0.1.2 via lt-0/1/0.5
*[Direct/0] 3w0d 01:38:10
> via lt-0/1/0.5
*[Local/0] 3w0d 01:38:11
Local via lt-0/1/0.5
*[Direct/0] 3w0d 01:38:11
> via lt-0/1/0.3

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

10.0.2.1/32

*[Local/0] 3w0d 01:38:11


Local via lt-0/1/0.3

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1234.1600.2231/72
*[Direct/0] 3w0d 01:38:11
> via lo0.3

From LS1, Ping LS3


user@host> set cli logical-system LS1
user@host:LS1> ping 10.0.2.1
PING 10.0.2.1 (10.0.2.1): 56 data bytes
64 bytes from 10.0.2.1: icmp_seq=0 ttl=63 time=1.264 ms
64 bytes from 10.0.2.1: icmp_seq=1 ttl=63 time=1.189 ms
64 bytes from 10.0.2.1: icmp_seq=2 ttl=63 time=1.165 ms
^C
--- 10.0.2.1 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.165/1.206/1.264/0.042 ms

From LS3, Ping LS1


user@host> set cli logical-system LS3
user@host:LS3> ping 10.0.0.1
PING 10.0.0.1 (10.0.0.1): 56 data bytes
64 bytes from 10.0.0.1: icmp_seq=0 ttl=63 time=1.254 ms
64 bytes from 10.0.0.1: icmp_seq=1 ttl=63 time=1.210 ms
^C
--- 10.0.0.1 ping statistics --2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.210/1.232/1.254/0.022 ms

From LS1, Ping LS2


user@host> set cli logical-system LS1
user@host:LS1> ping 10.0.2.2
PING 10.0.2.2 (10.0.2.2): 56 data bytes
64 bytes from 10.0.2.2: icmp_seq=0 ttl=64 time=1.240 ms
64 bytes from 10.0.2.2: icmp_seq=1 ttl=64 time=1.204 ms
64 bytes from 10.0.2.2: icmp_seq=2 ttl=64 time=1.217 ms
^C
--- 10.0.2.2 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.204/1.220/1.240/0.015 ms

From LS2, Ping LS1


user@host> set cli logical-system LS2
user@host:LS2> ping 10.0.1.2
PING 10.0.1.2 (10.0.1.2): 56 data bytes
64 bytes from 10.0.1.2: icmp_seq=0 ttl=64 time=1.308 ms
64 bytes from 10.0.1.2: icmp_seq=1 ttl=64 time=1.235 ms
^C
--- 10.0.1.2 ping statistics --2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.235/1.272/1.308/0.037 ms

Copyright 2015, Juniper Networks, Inc.

255

IS-IS Feature Guide for Routing Devices

From LS2, Ping LS3


user@host> set cli logical-system LS2
user@host:LS2> ping 10.0.1.1
PING 10.0.1.1 (10.0.1.1): 56 data bytes
64 bytes from 10.0.1.1: icmp_seq=0 ttl=64 time=1.253 ms
64 bytes from 10.0.1.1: icmp_seq=1 ttl=64 time=1.194 ms
64 bytes from 10.0.1.1: icmp_seq=2 ttl=64 time=1.212 ms
64 bytes from 10.0.1.1: icmp_seq=3 ttl=64 time=1.221 ms
64 bytes from 10.0.1.1: icmp_seq=4 ttl=64 time=1.195 ms
^C
--- 10.0.1.1 ping statistics --5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.194/1.215/1.253/0.022 ms

From LS3, Ping LS2


user@host> set cli logical-system LS3
user@host:LS3> ping 10.0.0.2
PING 10.0.0.2 (10.0.0.2): 56 data bytes
64 bytes from 10.0.0.2: icmp_seq=0 ttl=64 time=1.240 ms
64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=1.217 ms
^C
--- 10.0.0.2 ping statistics --2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.217/1.228/1.240/0.012 ms

Related
Documentation

Example: Creating an Interface on a Logical System

Example: Connecting Logical Systems Within the Same Router Using Logical Tunnel
Interfaces

Understanding Default Routes


A default route is the route that takes effect when no other route is available for an IP
destination address.
If a packet is received on a routing device, the device first checks to see if the IP destination
address is on one of the devices local subnets. If the destination address is not local, the
device checks its routing table. If the remote destination subnet is not listed in the routing
table, the packet is forwarded to the next hop toward the destination using the default
route. The default route generally has a next-hop address of another routing device,
which performs the same process. The process repeats until a packet is delivered to the
destination.
The route evaluation process in each router uses the longest prefix match method to
obtain the most specific route. The network with the longest subnet mask that matches
the destination IP address is the next-hop network gateway.
The default route in IPv4 is designated as 0.0.0.0/0 or simply 0/0. Similarly, in IPv6, the
default route is specified as ::/0. The subnet mask /0 specifies all networks, and is the
shortest match possible. A route lookup that does not match any other route uses this

256

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

route if it is configured and active in the routing table. To be active, the configured next-hop
address must be reachable.
Administrators generally point the default route toward the routing device that has a
connection to a network service provider. Therefore, packets with destinations outside
the organization's local area network, typically destinations on the Internet or a wide
area network, are forwarded to the routing device with the connection to that provider.
The device to which the default route points is often called the default gateway.
Related
Documentation

Example: Configuring an IS-IS Default Route Policy on Logical Systems on page 257

Example: Configuring an OSPF Default Route Policy on Logical Systems

Example: Configuring a Conditional Default Route Policy

Example: Configuring an IS-IS Default Route Policy on Logical Systems


This example shows logical systems configured on a single physical router and explains
how to configure a default route on one logical system.

Requirements on page 257

Overview on page 257

Configuration on page 258

Verification on page 261

Requirements
No special configuration beyond device initialization is required before configuring this
example.

Overview
This example shows a logical system redistributing a default route to other logical systems.
All logical systems are running IS-IS. A common reason for a default route is to provide
a path for sending traffic destined outside the IS-IS domain.
In this example, the default route is not used for forwarding traffic. The no-install
statement prevents the route from being installed in the forwarding table of Logical
System LS3. If you configure a route so it is not installed in the forwarding table, the route
is still eligible to be exported from the routing table to other protocols. The discard
statement silently drops packets without notice.
Figure 33 on page 258 shows the sample network.

Copyright 2015, Juniper Networks, Inc.

257

IS-IS Feature Guide for Routing Devices

Figure 33: IS-IS Logical Systems with a Default Route to an ISP

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set logical-systems LS3 interfaces lt-1/2/0 unit 3 description LS3->LS2
set logical-systems LS3 interfaces lt-1/2/0 unit 3 encapsulation ethernet
set logical-systems LS3 interfaces lt-1/2/0 unit 3 peer-unit 4
set logical-systems LS3 interfaces lt-1/2/0 unit 3 family inet address 10.0.2.1/30
set logical-systems LS3 interfaces lt-1/2/0 unit 3 family iso
set logical-systems LS3 interfaces lt-1/2/0 unit 5 description LS3->LS1
set logical-systems LS3 interfaces lt-1/2/0 unit 5 encapsulation ethernet
set logical-systems LS3 interfaces lt-1/2/0 unit 5 peer-unit 0
set logical-systems LS3 interfaces lt-1/2/0 unit 5 family inet address 10.0.1.1/30
set logical-systems LS3 interfaces lt-1/2/0 unit 5 family iso
set logical-systems LS3 interfaces lo0 unit 3 family iso address 49.0001.1234.1600.2231.00
set logical-systems LS3 protocols isis export isis-default
set logical-systems LS3 protocols isis interface lt-1/2/0.3
set logical-systems LS3 protocols isis interface lt-1/2/0.5
set logical-systems LS3 protocols isis interface lo0.3 passive
set logical-systems LS3 routing-options static route 0.0.0.0/0 discard
set logical-systems LS3 routing-options static route 0.0.0.0/0 no-install
set logical-systems LS3 policy-options policy-statement isis-default from protocol static
set logical-systems LS3 policy-options policy-statement isis-default from route-filter
0.0.0.0/0 exact
set logical-systems LS3 policy-options policy-statement isis-default then accept

258

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure an IS-IS default route policy on logical systems:
1.

Configure the logical tunnel interfaces.


[edit logical-systems LS3 interfaces lt-1/2/0]
user@R1# set unit 3 description LS3->LS2
user@R1# set unit 3 encapsulation ethernet
user@R1# set unit 3 peer-unit 4
user@R1# set unit 3 family inet address 10.0.2.1/30
user@R1# set unit 3 family iso
user@R1# set unit 5 description LS3->LS1
user@R1# set unit 5 encapsulation ethernet
user@R1# set unit 5 peer-unit 0
user@R1# set unit 5 family inet address 10.0.1.1/30
user@R1# set unit 5 family iso
[edit logical-systems LS3 interfaces lo0 unit 3]
user@R1# set family iso address 49.0001.1234.1600.2231.00

2.

Enable IS-IS on the interfaces.


[edit logical-systems LS3 protocols isis]
user@R1# set interface lt-1/2/0.3
user@R1# set interface lt-1/2/0.5
user@R1# set interface lo0.3 passive

3.

Configure the default route on Logical System LS3.


[edit logical-systems LS3 routing-options]
user@R1# set static route 0.0.0.0/0 discard
user@R1# set static route 0.0.0.0/0 no-install

4.

Configure the default route policy on Logical System LS3.


[edit logical-systems LS3 policy-options]
user@R1# set policy-statement isis-default from protocol static
user@R1# set policy-statement isis-default from route-filter 0.0.0.0/0 exact
user@R1# set policy-statement isis-default then accept

5.

Apply the export policy to IS-IS on Logical System LS3.


[edit logical-systems LS3 protocols isis]
user@R1# set export isis-default

6.

If you are done configuring the device, commit the configuration.


[edit]
user@R1# commit

Results
From configuration mode, confirm your configuration by issuing the show logical-systems
LS3 command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.

Copyright 2015, Juniper Networks, Inc.

259

IS-IS Feature Guide for Routing Devices

user@R1# show logical-systems LS3


interfaces {
lt-1/2/0 {
unit 3 {
description LS3->LS2;
encapsulation ethernet;
peer-unit 4;
family inet {
address 10.0.2.1/30;
}
family iso;
}
unit 5 {
description LS3->LS1;
encapsulation ethernet;
peer-unit 0;
family inet {
address 10.0.1.1/30;
}
family iso;
}
}
lo0 {
unit 3 {
family iso {
address 49.0001.1234.1600.2231.00;
}
}
}
}
protocols {
isis {
export isis-default;
interface lt-1/2/0.3;
interface lt-1/2/0.5;
interface lo0.3 {
passive;
}
}
}
policy-options {
policy-statement isis-default {
from {
protocol static;
route-filter 0.0.0.0/0 exact;
}
then accept;
}
}
routing-options {
static {
route 0.0.0.0/0 {
discard;
no-install;
}
}

260

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

}
}

Verification
Confirm that the configuration is working properly.

Verifying That the Static Route Is Redistributed


Purpose

Make sure that the IS-IS policy is working by checking the routing tables.

Copyright 2015, Juniper Networks, Inc.

261

IS-IS Feature Guide for Routing Devices

Action

user@R1> show route logical-system LS3


inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0
10.0.0.0/30

10.0.1.0/30
10.0.1.1/32
10.0.2.0/30
10.0.2.1/32

*[Static/5] 00:00:45
Discard
*[IS-IS/15] 1w0d 10:14:14, metric 20
to 10.0.2.2 via lt-1/2/0.3
> to 10.0.1.2 via lt-1/2/0.5
*[Direct/0] 1w0d 10:15:18
> via lt-1/2/0.5
*[Local/0] 1w0d 10:15:18
Local via lt-1/2/0.5
*[Direct/0] 1w0d 10:15:18
> via lt-1/2/0.3
*[Local/0] 1w0d 10:15:18
Local via lt-1/2/0.3

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1234.1600.2231/72
*[Direct/0] 1w0d 10:17:19
> via lo0.3
user@R1> show route logical-system LS2
inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0
10.0.0.0/30
10.0.0.2/32
10.0.1.0/30

10.0.2.0/30
10.0.2.2/32

*[IS-IS/160] 00:01:38, metric 10


> to 10.0.2.1 via lt-1/2/0.4
*[Direct/0] 1w0d 10:16:11
> via lt-1/2/0.1
*[Local/0] 1w0d 10:16:11
Local via lt-1/2/0.1
*[IS-IS/15] 1w0d 10:15:07, metric 20
> to 10.0.0.1 via lt-1/2/0.1
to 10.0.2.1 via lt-1/2/0.4
*[Direct/0] 1w0d 10:16:11
> via lt-1/2/0.4
*[Local/0] 1w0d 10:16:11
Local via lt-1/2/0.4

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1720.1600.2002/72
*[Direct/0] 1w0d 10:18:12
> via lo0.2
user@R1> show route logical-system LS1
inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0
10.0.0.0/30
10.0.0.1/32

262

*[IS-IS/160] 00:02:01, metric 10


> to 10.0.1.1 via lt-1/2/0.0
*[Direct/0] 1w0d 10:16:34
> via lt-1/2/0.2
*[Local/0] 1w0d 10:16:34
Local via lt-1/2/0.2

Copyright 2015, Juniper Networks, Inc.

Chapter 11: Configuring IS-IS on Logical Systems

10.0.1.0/30
10.0.1.2/32
10.0.2.0/30

*[Direct/0] 1w0d 10:16:34


> via lt-1/2/0.0
*[Local/0] 1w0d 10:16:34
Local via lt-1/2/0.0
*[IS-IS/15] 1w0d 10:15:55, metric 20
to 10.0.1.1 via lt-1/2/0.0
> to 10.0.0.2 via lt-1/2/0.2

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
49.0001.1720.1600.1001/72
*[Direct/0] 1w0d 10:18:35
> via lo0.1

Meaning

Related
Documentation

The routing table on Logical System LS3 contains the default 0.0.0.0/0 route from
protocol Static. The routing tables on Logical System LS1 and Logical System LS2 contain
the default 0.0.0.0/0 route from protocol IS-IS. If Logical System LS1 and Logical System
LS2 receive packets destined for networks not specified in their routing tables, those
packets will be sent to Logical System LS3 for further processing. This configuration
assumes that Logical System LS3 has a connection to an ISP or another external network.

Example: Creating an Interface on a Logical System

Copyright 2015, Juniper Networks, Inc.

263

IS-IS Feature Guide for Routing Devices

264

Copyright 2015, Juniper Networks, Inc.

PART 3

Monitoring and Troubleshooting Network


Issues

Monitoring Networks on page 267

Troubleshooting Network Issues on page 273

Troubleshooting IS-IS on page 279

Routing Protocol Process Memory FAQs on page 301

Copyright 2015, Juniper Networks, Inc.

265

IS-IS Feature Guide for Routing Devices

266

Copyright 2015, Juniper Networks, Inc.

CHAPTER 12

Monitoring Networks

Example: Tracing Global Routing Protocol Operations on page 267

Example: Tracing Global Routing Protocol Operations


This example shows how to list and view files that are created when you enable global
routing trace operations.

Requirements on page 267

Overview on page 267

Configuration on page 268

Verification on page 270

Requirements
You must have the view privilege.

Overview
To configure global routing protocol tracing, include the traceoptions statement at the
[edit routing-options] hierarchy level:
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <disable>;
}

The flags in a traceoptions flag statement are identifiers. When you use the set command
to configure a flag, any flags that might already be set are not modified. In the following
example, setting the timer tracing flag has no effect on the already configured task flag.
Use the delete command to delete a particular flag.
[edit routing-options traceoptions]
user@host# show
flag task;
user@host# set traceoptions flag timer
user@host# show
flag task;
flag timer;
user@host# delete traceoptions flag task
user@host# show

Copyright 2015, Juniper Networks, Inc.

267

IS-IS Feature Guide for Routing Devices

flag timer;

This example shows how to configure and view a trace file that tracks changes in the
routing table. The steps can be adapted to apply to trace operations for any Junos OS
hierarchy level that supports trace operations.

TIP: To view a list of hierarchy levels that support tracing operations, enter
the help apropos traceoptions command in configuration mode.

Configuration
CLI Quick
Configuration

To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set routing-options traceoptions file routing-table-changes
set routing-options traceoptions file size 10m
set routing-options traceoptions file files 10
set routing-options traceoptions flag route
set routing-options static route 1.1.1.2/32 next-hop 10.0.45.6

Configuring Trace Operations


Step-by-Step
Procedure

The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure the trace operations:
1.

Configure trace operations.


[edit routing-options traceoptions]
user@host# set file routing-table-changes
user@host# set file size 10m
user@host# set file files 10
user@host# set flag route

2.

Configure a static route to cause a change in the routing table.


[edit routing-options static]
user@host# set route 1.1.1.2/32 next-hop 10.0.45.6

3.

If you are done configuring the device, commit the configuration.


[edit]
user@host# commit

268

Copyright 2015, Juniper Networks, Inc.

Chapter 12: Monitoring Networks

Viewing the Trace File


Step-by-Step
Procedure

To view the trace file:


1.

In operational mode, list the log files on the system.


user@host> file list /var/log
/var/log:
...
routing-table-changes
...

2.

View the contents of the routing-table-changes file.


user@host> file show /var/log/routing-table-changes
Dec 15 11:09:29 trace_on: Tracing to "/var/log/routing-table-changes" started
Dec 15 11:09:29.496507
Dec 15 11:09:29.496507 Tracing flags enabled: route
Dec 15 11:09:29.496507
Dec 15 11:09:29.533203 inet_routerid_notify: Router ID: 192.168.4.1
Dec 15 11:09:29.533334 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.533381 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.533420 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.534915 inet_routerid_notify: Router ID: 192.168.4.1
Dec 15 11:09:29.542934 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.549253 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.556878 inet_routerid_notify: No Router ID assigned
Dec 15 11:09:29.582990 rt_static_reinit: examined 3 static nexthops, 0
unreferenced
Dec 15 11:09:29.589920
Dec 15 11:09:29.589920 task_reconfigure reinitializing done
...

3.

Filter the output of the log file.


user@host> file show /var/log/routing-table-changes | match 1.1.1.2
Dec 15 11:15:30.780314 ADD
1.1.1.2/32
nhid 0 gw 10.0.45.6
Static
pref 5/0 metric at-0/2/0.0 <ctive Int Ext>
Dec 15 11:15:30.782276 KRT Request: send len 216 v104 seq 0 ADD route/user
af 2 table 0 infot 0 addr 1.1.1.2 nhop-type unicast nhindex 663

4.

View the tracing operations in real time by running the monitor start command with
an optional match condition.
user@host> monitor start routing-table-changes | match 1.1.1.2
Aug 10 19:21:40.773467 BGP RECV
0.0.0.0/0
Aug 10 19:21:40.773685 bgp_rcv_nlri: 0.0.0.0/0
Aug 10 19:21:40.773778 bgp_rcv_nlri: 0.0.0.0/0 belongs to meshgroup
Aug 10 19:21:40.773832 bgp_rcv_nlri: 0.0.0.0/0 qualified bnp->ribact 0x0
l2afcb 0x0

5.

Deactivate the static route.


user@host# deactivate routing-options static route 1.1.1.2/32
user@host# commit
*** routing-table-changes ***
Dec 15 11:42:59.355557 CHANGE
1.1.1.2/32
nhid 663 gw 10.0.45.6
Static
pref 5/0 metric at-0/2/0.0 <Delete Int Ext>
Dec 15 11:42:59.426887 KRT Request: send len 216 v104 seq 0 DELETE route/user
af 2 table 0 infot 0 addr 1.1.1.2 nhop-type discard filtidx 0

Copyright 2015, Juniper Networks, Inc.

269

IS-IS Feature Guide for Routing Devices

Dec 15 11:42:59.427366 RELEASE 1.1.1.2/32


nhid 663 gw 10.0.45.6
Static
pref 5/0 metric at-0/2/0.0 <Release Delete Int Ext>
6.

Halt the monitor command by pressing Enter and typing monitor stop.
[Enter]
user@host> monitor stop

7.

When you are finished troubleshooting, consider deactivating trace logging to avoid
any unnecessary impact to system resources.
When configuration is deactivated, it appears in the configuration with the inactive
tag.
[edit routing-options]
user@host# deactivate traceoptions
user@host# commit
[edit routing-options]
user@host# show
inactive: traceoptions {
file routing-table-changes size 10m files 10;
flag route;
}
static {
inactive: route 1.1.1.2/32 next-hop 10.0.45.6;
}

8.

To reactivate trace operations, use the activate configuration-mode statement.


[edit routing-options]
user@host# activate traceoptions
user@host# commit

Results
From configuration mode, confirm your configuration by entering the show routing-options
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user@host# show routing-options
traceoptions {
file routing-table-changes size 10m files 10;
flag route;
}
static {
route 1.1.1.2/32 next-hop 10.0.45.6;
}

Verification
Confirm that the configuration is working properly.

Verifying That the Trace Log File Is Operating


Purpose

270

Make sure that events are being written to the log file.

Copyright 2015, Juniper Networks, Inc.

Chapter 12: Monitoring Networks

Action

Related
Documentation

user@host> show log routing-table-changes


Dec 15 11:09:29 trace_on: Tracing to "/var/log/routing-table-changes" started

Understanding Global Routing Protocol Tracing Operations

CLI Explorer

Copyright 2015, Juniper Networks, Inc.

271

IS-IS Feature Guide for Routing Devices

272

Copyright 2015, Juniper Networks, Inc.

CHAPTER 13

Troubleshooting Network Issues

Working with Problems on Your Network on page 273

Isolating a Broken Network Connection on page 274

Identifying the Symptoms of a Broken Network Connection on page 275

Isolating the Causes of a Network Problem on page 276

Taking Appropriate Action for Resolving the Network Problem on page 277

Evaluating the Solution to Check Whether the Network Problem Is Resolved on page 277

Working with Problems on Your Network


Problem

Description: This checklist provides links to troubleshooting basics, an example network,


and includes a summary of the commands you might use to diagnose problems with the
router and network.

Table 7: Checklist
Solution
for Working with Problems on Your Network
Tasks

Command or Action

Isolating a Broken Network Connection on page 274


1.

Identifying the Symptoms of a Broken Network Connection on


page 275

ping (ip-address | hostname)


show route (ip-address | hostname)
traceroute (ip-address | hostname)

2. Isolating the Causes of a Network Problem on page 276

show < configuration | interfaces | protocols | route >

3. Taking Appropriate Action for Resolving the Network Problem


on page 277

[edit]
delete routing options static route destination-prefix
commit and-quit
show route destination-prefix

4. Evaluating the Solution to Check Whether the Network Problem


Is Resolved on page 277

show route (ip-address | hostname)


ping (ip-address | hostname) count 3
traceroute (ip-address | hostname)

Copyright 2015, Juniper Networks, Inc.

273

IS-IS Feature Guide for Routing Devices

Isolating a Broken Network Connection


By applying the standard four-step process illustrated in Figure 34 on page 274, you can
isolate a failed node in the network.

Figure 34: Process for Diagnosing Problems in Your Network

Before you embark on the four-step process, however, it is important that you are prepared
for the inevitable problems that occur on all networks. While you might find a solution
to a problem by simply trying a variety of actions, you can reach an appropriate solution
more quickly if you are systematic in your approach to the maintenance and monitoring
of your network. To prepare for problems on your network, understand how the network
functions under normal conditions, have records of baseline network activity, and carefully
observe the behavior of your network during a problem situation.
Figure 35 on page 274 shows the network topology used in this topic to illustrate the
process of diagnosing problems in a network.

Figure 35: Network with a Problem


AS 65001

lo0: .1
R1
so-0/0/1.15.1

Aggregate Routes:
100.100.1.0/24
100.100.2.0/24
100.100.3.0/24
100.100.4.0/24
so-0/0/0.12.2
so-0/0/0.12.1

AS 65002

lo0: .3

lo0: .2
R2

so-0/0/1.23.1
so-0/0/1.23.2

so-0/0/2.26.1

R3
so-0/0/3.36.1

so-0/0/1.15.2
so-0/0/3.36.2
R6

lo0: .5

lo0: .6

Key:
so-0/0/X: 10.1.x.x/30
lo0: 10.0.0.x/32

g003255

so-0/0/2.26.2
R5

I-BGP
E-BGP

The network in Figure 35 on page 274 consists of two autonomous systems (ASs). AS
65001 includes two routers, and AS 65002 includes three routers. The border router (R1)
in AS 65001 announces aggregated prefixes 100.100/24 to the AS 65002 network. The

274

Copyright 2015, Juniper Networks, Inc.

Chapter 13: Troubleshooting Network Issues

problem in this network is that R6 does not have access to R5 because of a loop between
R2 and R6.
To isolate a failed connection in your network, follow these steps:

Identifying the Symptoms of a Broken Network Connection


Problem

Description: The symptoms of a problem in your network are usually quite obvious, such
as the failure to reach a remote host.

Solution

To identify the symptoms of a problem on your network, start at one end of your network
and follow the routes to the other end, entering all or one of the following Junos OS
command-line interfaces (CLI) operational mode commands:
user@host> ping (ip-address | host-name)
user@host> show route (ip-address | host-name)
user@host> traceroute (ip-address | host-name)

Sample Output
user@R6> ping 10.0.0.5
PING 10.0.0.5 (10.0.0.5): 56 data bytes
36 bytes from 10.1.26.1: Time to live exceeded
Vr HL TOS Len
ID Flg off TTL Pro cks
Src
4 5 00 0054 e2db
0 0000 01 01 a8c6 10.1.26.2

Dst
10.0.0.5

36 bytes from 10.1.26.1: Time to live exceeded


Vr HL TOS Len
ID Flg off TTL Pro cks
Src
4 5 00 0054 e2de
0 0000 01 01 a8c3 10.1.26.2

Dst
10.0.0.5

36 bytes from 10.1.26.1: Time to live exceeded


Vr HL TOS Len
ID Flg off TTL Pro cks
Src
4 5 00 0054 e2e2
0 0000 01 01 a8bf 10.1.26.2

Dst
10.0.0.5

^C
--- 10.0.0.5 ping statistics --3 packets transmitted, 0 packets received, 100% packet loss
user@R6> show route 10.0.0.5
inet.0: 20 destinations, 20 routes (20 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.5/32

*[IS-IS/165] 00:02:39, metric 10


> to 10.1.26.1 via so-0/0/2.0

user@R6> traceroute 10.0.0.5


traceroute to 10.0.0.5 (10.0.0.5), 30 hops
1 10.1.26.1 (10.1.26.1) 0.649 ms 0.521
2 10.1.26.2 (10.1.26.2) 0.521 ms 0.537
3 10.1.26.1 (10.1.26.1) 0.523 ms 0.536
4 10.1.26.2 (10.1.26.2) 0.528 ms 0.551
5 10.1.26.1 (10.1.26.1) 0.531 ms 0.550

max, 40 byte packets


ms 0.490 ms
ms 0.507 ms
ms 0.514 ms
ms 0.523 ms
ms 0.524 ms

Meaning
The sample output shows an unsuccessful ping command in which the packets are being
rejected because the time to live is exceeded. The output for the show route command

Copyright 2015, Juniper Networks, Inc.

275

IS-IS Feature Guide for Routing Devices

shows the interface (10.1.26.1) that you can examine further for possible problems. The
traceroute command shows the loop between 10.1.26.1 (R2) and 10.1.26.2 (R6), as indicated
by the continuous repetition of the two interface addresses.

Isolating the Causes of a Network Problem


Problem

Description: A particular symptom can be the result of one or more causes. Narrow down
the focus of your search to find each individual cause of the unwanted behavior.

Solution

To isolate the cause of a particular problem, enter one or all of the following Junos OS
CLI operational mode command:
To isolate the cause of a particular problem, enter one or all of the following Junos OS
CLI operational mode command:
user@host> show < configuration | bgp | interfaces | isis | ospf | route >

Your particular problem may require the use of more than just the commands listed
above. See the appropriate command reference for a more exhaustive list of commonly
used operational mode commands.
Sample Output
user@R6> show interfaces terse
Interface
Admin Link Proto
so-0/0/0
up
up
so-0/0/0.0
up
up
inet
iso
so-0/0/2
up
up
so-0/0/2.0
up
up
inet
iso
so-0/0/3
up
up
so-0/0/3.0
up
up
inet
iso
[...Output truncated...]

Local

Remote

10.1.56.2/30

10.1.26.2/30

10.1.36.2/30

The following sample output is from R2:


user@R2> show route 10.0.0.5
inet.0: 22 destinations, 25 routes (22 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.5/32

*[Static/5] 00:16:21
> to 10.1.26.2 via so-0/0/2.0
[BGP/170] 3d 20:23:35, MED 5, localpref 100
AS path: 65001 I
> to 10.1.12.1 via so-0/0/0.0

Meaning
The sample output shows that all interfaces on R6 are up. The output from R2 shows
that a static route [Static/5] configured on R2 points to R6 (10.1.26.2) and is the preferred
route to R5 because of its low preference value. However, the route is looping from R2
to R6, as indicated by the missing reference to R5 (10.1.15.2).

276

Copyright 2015, Juniper Networks, Inc.

Chapter 13: Troubleshooting Network Issues

Taking Appropriate Action for Resolving the Network Problem


Problem

Description: The appropriate action depends on the type of problem you have isolated.
In this example, a static route configured on R2 is deleted from the [routing-options]
hierarchy level. Other appropriate actions might include the following:

Solution

Check the local routers configuration and edit it if appropriate.

Troubleshoot the intermediate router.

Check the remote host configuration and edit it if appropriate.

Troubleshoot routing protocols.

Identify additional possible causes.

To resolve the problem in this example, enter the following Junos OS CLI commands:
[edit]
user@R2# delete routing-options static route destination-prefix
user@R2# commit and-quit
user@R2# show route destination-prefix

Sample Output
[edit]
user@R2# delete routing-options static route 10.0.0.5/32
[edit]
user@R2# commit and-quit
commit complete
Exiting configuration mode
user@R2> show route 10.0.0.5
inet.0: 22 destinations, 24 routes (22 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.5/32

*[BGP/170] 3d 20:26:17, MED 5, localpref 100


AS path: 65001 I
> to 10.1.12.1 via so-0/0/0.0

Meaning
The sample output shows the static route deleted from the [routing-options] hierarchy
and the new configuration committed. The output for the show route command now
shows the BGP route as the preferred route, as indicated by the asterisk (*).

Evaluating the Solution to Check Whether the Network Problem Is Resolved


Problem

Description: If the problem is solved, you are finished. If the problem remains or a new
problem is identified, start the process over again.
You can address possible causes in any order. In relation to the network in Isolating a
Broken Network Connection on page 274, we chose to work from the local router toward
the remote router, but you might start at a different point, particularly if you have reason

Copyright 2015, Juniper Networks, Inc.

277

IS-IS Feature Guide for Routing Devices

to believe that the problem is related to a known issue, such as a recent change in
configuration.

Solution

To evaluate the solution, enter the following Junos OS CLI commands:


user@host> show route (ip-address |host-name)
user@host> ping (ip-address | host-name)
user@host> traceroute (ip-address | host-name)

Sample Output
user@R6> show route 10.0.0.5
inet.0: 20 destinations, 20 routes (20 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.5/32

*[BGP/170] 00:01:35, MED 5, localpref 100, from 10.0.0.2


AS path: 65001 I
> to 10.1.26.1 via so-0/0/2.0

user@R6> ping 10.0.0.5


PING 10.0.0.5 (10.0.0.5): 56 data bytes
64 bytes from 10.0.0.5: icmp_seq=0 ttl=253 time=0.866 ms
64 bytes from 10.0.0.5: icmp_seq=1 ttl=253 time=0.837 ms
64 bytes from 10.0.0.5: icmp_seq=2 ttl=253 time=0.796 ms
^C
--- 10.0.0.5 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.796/0.833/0.866/0.029 ms
user@R6> traceroute 10.0.0.5
traceroute to 10.0.0.5 (10.0.0.5), 30 hops max, 40 byte packets
1 10.1.26.1 (10.1.26.1) 0.629 ms 0.538 ms 0.497 ms
2 10.1.12.1 (10.1.12.1) 0.534 ms 0.538 ms 0.510 ms
3 10.0.0.5 (10.0.0.5) 0.776 ms 0.705 ms 0.672 ms

Meaning
The sample output shows that there is now a connection between R6 and R5. The show
route command shows that the BGP route to R5 is preferred, as indicated by the asterisk
(*). The ping command is successful and the traceroute command shows that the path
from R6 to R5 is through R2 (10.1.26.1), and then through R1 (10.1.12.1).

278

Copyright 2015, Juniper Networks, Inc.

CHAPTER 14

Troubleshooting IS-IS

Verifying the IS-IS Protocol on page 279

Verifying the IS-IS Configuration on a Router in a Network on page 287

Displaying the Status of IS-IS Adjacencies on page 293

Displaying Detailed IS-IS Protocol Information on page 294

Analyzing IS-IS Link-State PDUs in Detail on page 297

Displaying Sent or Received IS-IS Protocol Packets on page 298

Verifying the IS-IS Protocol


Purpose

If your MPLS network is configured with IS-IS as the interior gateway protocol (IGP), and
the output of the show mpls lsp extensive command shows that there is a problem, check
the IP and IS-IS layers. Because IS-IS and IP are independent of each other, you can check
either layer first. For more information about checking the IP layer, see Verifying the IP
Layer.
After you have checked the IP layer and determined that there is still a problem, check
the IS-IS layer, verify that IS-IS adjacencies are up, and make sure that the interfaces
and IS-IS protocol are configured correctly.

Figure 36: MPLS Network Broken at the IS-IS Protocol Layer

Copyright 2015, Juniper Networks, Inc.

279

IS-IS Feature Guide for Routing Devices

To check the IS-IS protocol, follow these steps:


1.

Verify the LSP on page 280

2. Verify IS-IS Adjacencies and Interfaces on page 281


3. Verify the IS-IS Configuration on page 282
4. Take Appropriate Action on page 283
5. Verify the LSP Again on page 284

Verify the LSP


Purpose

Action

Confirm that interfaces are configured for IS-IS, that the IS-IS protocol is configured
correctly, and that adjacencies are established.
To verify the label-switched path (LSP), enter the following command on the ingress,
transit, and egress routers:
user@host> show mpls lsp extensive

Sample Output 1
user@R1> show mpls lsp extensive
Ingress LSP: 1 sessions
10.0.0.6
From: 10.0.0.1, State: Dn, ActiveRoute: 0 , LSPname: R1-to-R6
ActivePath: (none)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
Primary
State: Dn
24 Oct 21 13:48:01 No Route toward dest [3 times]
23 Oct 21 13:47:44 Deselected as active
22 Oct 21 13:47:43 No Route toward dest[2 times]
21 Oct 21 13:47:43 ResvTear received
20 Oct 21 13:47:43 Down
19 Oct 21 13:47:43 10.1.13.2: No Route toward dest[2 times]
18 Oct 21 13:47:38 Record Route: 10.1.13.2 10.1.36.2
[...Output truncated...]
Created: Tue Oct 19 21:22:53 2004
Total 1 displayed, Up 0, Down 1
Egress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0
Transit LSP: 0 sessions
Total 0 displayed, Up 0, Down 0

Sample Output 2
user@R3> show mpls lsp extensive
Ingress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0
Egress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0

280

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Transit LSP: 0 sessions


Total 0 displayed, Up 0, Down 0

Sample Output 3
user@R6> show mpls lsp extensive
Ingress LSP: 1 sessions
10.0.0.1
From: 10.0.0.6, State: Dn, ActiveRoute: 0 , LSPname: R6-to-R1
ActivePath: (none)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
Primary
State: Dn
Will be enqueued for recomputation in 3 second(s).
13 Oct 21 14:23:33 CSPF failed: no route toward 10.0.0.1[90 times]
12 Oct 21 13:39:56 Deselected as active
11 Oct 21 13:39:56 CSPF: could not determine self
[...Output truncated...]
Created: Tue Oct 19 22:28:30 2004
Total 1 displayed, Up 0, Down 1
Egress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0
Transit LSP: 0 sessions
Total 0 displayed, Up 0, Down 0

Meaning

The sample output shows that LSP R1-to-R6 and the reverse LSP R6-to-R1 are down,
and there are no LSP sessions on transit router R3.

Verify IS-IS Adjacencies and Interfaces


Purpose

When you check the IS-IS layer, you verify that IS-IS adjacencies are up and that the IS-IS
interfaces are included at the protocol level.

Action

To verify the functioning of adjacent interfaces, enter the following commands from the
relevant routers:
user@host> show isis adjacency
user@host> show isis interface

Sample Output 1
user@R1> show isis adjacency
Interface
System
so-0/0/0.0
R2
so-0/0/1.0
R5
so-0/0/2.0
R3
user@R3> show isis adjacency
Interface
System
so-0/0/0.0
R4
so-0/0/1.0
R2
so-0/0/2.0
R1
so-0/0/3.0
R6
2 Down

Copyright 2015, Juniper Networks, Inc.

L
2
2
2

State
Up
Up
Up

Hold (secs) SNPA


20
23
26

L
2
2
2

State
Up
Up
Up

Hold (secs) SNPA


23
21
19
0

281

IS-IS Feature Guide for Routing Devices

user@R6> show isis adjacency


IS-IS instance is not running

Sample Output 2
user@R1> show isis interface
IS-IS interface database:
Interface
L CirID
lo0.0
0
0x1
so-0/0/0.0
2
0x1
so-0/0/1.0
2
0x1
so-0/0/2.0
2
0x1

Level 1 DR
Passive
Disabled
Disabled
Disabled

Level 2 DR
Passive
Point to Point
Point to Point
Point to Point

L1/L2 Metric
0/0
10/10
10/10
10/10

user@R3> show isis interface


IS-IS interface database:
Interface
L CirID
lo0.0
0
0x1
so-0/0/0.0
2
0x1
so-0/0/1.0
2
0x1
so-0/0/2.0
2
0x1
so-0/0/3.0
2
0x1

Level 1 DR
Passive
Disabled
Disabled
Disabled
Disabled

Level 2 DR
Passive
Point to Point
Point to Point
Point to Point
Point to Point

L1/L2 Metric
0/0
10/10
10/10
10/10
10/10

user@R6> show isis interface


IS-IS interface database:
Interface
L CirID Level 1 DR
lo0.0
0
0x1 Passive
so-0/0/0.0
1
0x1 Point to Point
so-0/0/1.0
1
0x1 Down
so-0/0/2.0
1
0x1 Point to Point
so-0/0/3.0
1
0x1 Point to Point

Meaning

Level 2 DR
Passive
Disabled
Disabled
Disabled
Disabled

L1/L2 Metric
0/0
10/10
10/10
10/10
10/10

Sample Output 1 shows that ingress router R1 has established adjacencies with the
relevant routers. Transit router R3 does not have an adjacency with egress router R6, and
egress router R6 has no adjacencies established in the network shown in MPLS Network
Broken at the IP and IGP Layers, indicating that the problem might be at the IS-IS protocol
level.
Sample Output 2 shows that R1 and R2 are Level 2 routers, in contrast to R6 which is a
Level 1 router. When a router is configured explicitly as a Level 1 or Level 2 router, it does
not communicate with routers configured at a different level. Level 1 routers communicate
with other Level 1 routers within their area, while Level 2 routers communicate with other
Level 2 routers, and toward other autonomous systems. Because all the routers in this
network are configured for Level 2, they cannot form an adjacency with R6, which is
incorrectly configured as a Level 1 router.

Verify the IS-IS Configuration


Purpose

When you have determined that the problem is probably at the IS-IS protocol level, check
the IS-IS configuration of the routers in your network.

Action

To verify the IS-IS configuration, enter the following command from the relevant routers:
user@host> show configuration protocols isis

282

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Sample Output
user@R1> show configuration protocols isis
level 1 disable;
interface so-0/0/0.0;
interface so-0/0/1.0;
interface so-0/0/2.0;
interface lo0.0; {
passive
user@R3> show configuration protocols isis
level 1 disable;
interface all {
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0; {
passive
user@R6> show configuration protocols isis
level 2 disable; <<< Incorrect level disabled
interface all {
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0; {
passive

Meaning

The sample output shows that R6 has Level 2 disabled, while R1 and R3 have Level 1
disabled. For IS-IS adjacencies to establish, routers need to be at the same level. Another
common configuration error is to omit the loopback interface (lo0) from the configuration
at the [edit protocols isis] hierarchy level. IS-IS does not function correctly if the loopback
interface (lo0) is not configured at this level. In addition, including the passive statement
ensures that protocols are not run over the loopback interface (lo0) and that the loopback
interface (lo0) is advertised correctly throughout the network.

Take Appropriate Action


Problem

Description: Depending on the error you encountered in your investigation, you must take
the appropriate action to correct the problem. In the example below, the routers are
configured to function at different levels of the IS-IS protocol.

Solution

To correct the error in this example, enter the following commands:

Copyright 2015, Juniper Networks, Inc.

283

IS-IS Feature Guide for Routing Devices

Sample Output

[edit protocols isis]


user@R6# show
level 2 disable;
interface all {
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0; {
passive
[edit protocols isis]
user@R6# delete level 2
[edit protocols isis]
user@R6# set level 1 disable
[edit protocols isis]
user@R6# show
level 1 disable;
interface all {
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0; {
passive
[edit protocols isis]
user@R6# commit
commit complete
[edit protocols isis]
user@R6# run show isis adjacency
Interface
System
so-0/0/0.0
R5
so-0/0/1.0
R4
so-0/0/2.0
R2
so-0/0/3.0
R3

Meaning

L
2
2
2
2

State
Up
Up
Up
Up

Hold (secs) SNPA


22
22
22
22

The sample output shows that the configuration error on egress router R6 has been
corrected, and IS-IS adjacencies are now established.

Verify the LSP Again


Purpose

Action

After taking the appropriate action to correct the error, the label-switched path (LSP)
needs to be checked again to confirm that the problem in the RSVP layer has been
resolved.
To verify that the LSP is up and traversing the network as expected, enter the following
command from the ingress, egress, and transit routers:
user@host> show mpls lsp extensive

284

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Sample Output 1
user@R1> show mpls lsp extensive
Ingress LSP: 1 sessions
10.0.0.6
From: 10.0.0.1, State: Up, ActiveRoute: 1 , LSPname: R1-to-R6
ActivePath: (primary)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary
State: Up
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 20)
10.1.13.2 S 10.1.36.2 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt):
10.1.13.2 10.1.36.2
5 Oct 21 15:52:07 Selected as active path
4 Oct 21 15:52:07 Record Route: 10.1.13.2 10.1.36.2
3 Oct 21 15:52:07 Up
2 Oct 21 15:52:07 Originate Call
1 Oct 21 15:52:07 CSPF: computation result accepted
Created: Thu Oct 21 15:52:06 2004
Total 1 displayed, Up 1 , Down 0
Egress LSP: 1 sessions
10.0.0.1
From: 10.0.0.6, LSPstate: Up, ActiveRoute: 0
LSPname: R6-to-R1 , LSPpath: Primary
Suggested label received: -, Suggested label sent: Recovery label received: -, Recovery label sent: Resv style: 1 FF, Label in: 3, Label out: Time left: 142, Since: Thu Oct 21 15:41:59 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 2 receiver 39082 protocol 0
PATH rcvfrom: 10.1.13.2 (so-0/0/2.0) 17 pkts
Adspec: received MTU 1500
PATH sentto: localclient
RESV rcvfrom: localclient
Record route: 10.1.36.2 10.1.13.2 <self>
Total 1 displayed, Up 1 , Down 0
Transit LSP: 0 sessions
Total 0 displayed, Up 0, Down 0

Sample Output 2
user@R3> show mpls lsp extensive
Ingress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0
Egress LSP: 0 sessions
Total 0 displayed, Up 0, Down 0
Transit LSP: 2 sessions
10.0.0.1
From: 10.0.0.6, LSPstate: Up, ActiveRoute: 1
LSPname: R6-to-R1 , LSPpath: Primary
Suggested label received: -, Suggested label sent: -

Copyright 2015, Juniper Networks, Inc.

285

IS-IS Feature Guide for Routing Devices

Recovery label received: -, Recovery label sent: 3


Resv style: 1 FF, Label in: 100528, Label out: 3
Time left: 125, Since: Thu Oct 21 15:29:26 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 2 receiver 39082 protocol 0
PATH rcvfrom: 10.1.36.2 (so-0/0/3.0) 17 pkts
Adspec: received MTU 1500 sent MTU 1500
PATH sentto: 10.1.13.1 (so-0/0/2.0) 17 pkts
RESV rcvfrom: 10.1.13.1 (so-0/0/2.0) 17 pkts
Explct route: 10.1.13.1
Record route: 10.1.36.2 <self> 10.1.13.1
10.0.0.6
From: 10.0.0.1, LSPstate: Up, ActiveRoute: 1
LSPname: R1-to-R6 , LSPpath: Primary
Suggested label received: -, Suggested label sent: Recovery label received: -, Recovery label sent: 3
Resv style: 1 FF, Label in: 100544, Label out: 3
Time left: 147, Since: Thu Oct 21 15:39:33 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 47963 protocol 0
PATH rcvfrom: 10.1.13.1 (so-0/0/2.0) 4 pkts
Adspec: received MTU 1500 sent MTU 1500
PATH sentto: 10.1.36.2 (so-0/0/3.0) 4 pkts
RESV rcvfrom: 10.1.36.2 (so-0/0/3.0) 4 pkts
Explct route: 10.1.36.2
Record route: 10.1.13.1 <self> 10.1.36.2
Total 2 displayed, Up 2, Down 0

Sample Output 3
user@R6> show mpls lsp extensive
Ingress LSP: 1 sessions
10.0.0.1
From: 10.0.0.6, State: Up, ActiveRoute: 1, LSPname: R6-to-R1
ActivePath: (primary)
LoadBalance: Random
Encoding type: Packet, Switching type: Packet, GPID: IPv4
*Primary
State: Up
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 20)
10.1.36.1 S 10.1.13.1 S
Received RRO (ProtectionFlag 1=Available 2=InUse 4=B/W 8=Node 10=SoftPreempt):
10.1.36.1 10.1.13.1
18 Oct 21 15:34:18 Selected as active path
17 Oct 21 15:34:17 Record Route: 10.1.36.1 10.1.13.1
16 Oct 21 15:34:17 Up
15 Oct 21 15:34:17 Originate Call
14 Oct 21 15:34:17 CSPF: computation result accepted
[...Output truncated...]
Created: Tue Oct 19 22:28:30 2004
Total 1 displayed, Up 1, Down 0
Egress LSP: 1 sessions
10.0.0.6
From: 10.0.0.1, LSPstate: Up, ActiveRoute: 0
LSPname: R1-to-R6 , LSPpath: Primary
Suggested label received: -, Suggested label sent: Recovery label received: -, Recovery label sent: -

286

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Resv style: 1 FF, Label in: 3, Label out: Time left: 126, Since: Thu Oct 21 15:44:25 2004
Tspec: rate 0bps size 0bps peak Infbps m 20 M 1500
Port number: sender 1 receiver 47963 protocol 0
PATH rcvfrom: 10.1.36.1 (so-0/0/3.0) 4 pkts
Adspec: received MTU 1500
PATH sentto: localclient
RESV rcvfrom: localclient
Record route: 10.1.13.1 10.1.36.1 <self>
Total 1 displayed, Up 1, Down 0
Transit LSP: 0 sessions
Total 0 displayed, Up 0, Down 0

Meaning

Sample Outputs 1 and 3 from ingress router R1 and egress router R6 show that the LSP
is now traversing the network along the expected path, from R1 through R3 to R6, and
the reverse LSP, from R6 through R3 to R1. In addition, Sample Output 2 from transit
router R3 shows that there are two transit LSP sessions, one from R1 to R6, and the other
from R6 to R1.

Verifying the IS-IS Configuration on a Router in a Network


Purpose

For IS-IS to run on a router (intermediate system) in your network, you must enable IS-IS
on the router, configure a network entity title (NET) on the loopback interface (lo0), and
configure family iso on all interfaces on which you want to run IS-IS. When you enable
IS-IS on a router, Level 1 and Level 2 are enabled by default.
Figure 37 on page 287 illustrates an example of routers at different levels in an IS-IS
topology.

Figure 37: Levels in an IS-IS Network Topology

Copyright 2015, Juniper Networks, Inc.

287

IS-IS Feature Guide for Routing Devices

The network in Figure 37 on page 287 is organized hierarchically and consists of Level 2,
Level 1/Level 2, and Level 1 routers in one autonomous system (AS) divided into four
areas: 49.0001, 49.0002, 49.0003, and 49.0004. The Level 2 routers route toward other
autonomous systems. The Level 1/Level 2 routers route between areas and to other
autonomous systems. The Level 1 routers route within an area, and when the destination
is outside the local area, they route toward a Level1/Level2 system.
In the following topics, the configuration of the various types of routers is examined.
Figure 38 on page 288 provides more details about the IS-IS network topology in
Figure 37 on page 287 so that you can verify the configuration output of the various routers.

Figure 38: IS-IS Network Topology with Details

To verify that IS-IS is configured correctly on routers at different levels, follow these
steps:
1.

Check the Configuration of a Level 1/Level 2 Router on page 288

2. Check the Configuration of a Level 1 Router on page 290


3. Check the Configuration of a Level 2 Router on page 291

Check the Configuration of a Level 1/Level 2 Router


Purpose
Action

288

Check the configuration of a Level 1/Level 2 router.


To verify the IS-IS configuration of a Level 1/Level 2 router in your network, enter the
following Junos OS command-line interface (CLI) commands:

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

user@host# [edit protocols isis] show


user@host# [edit protocols isis]
user@host# run show isis interface
user@host# [edit] edit interfaces
user@host# [edit interfaces] show

The following output is for an IS-IS configuration on R2, a Level 1/Level 2 router in the
network shown.

Sample Output
[edit protocols isis]
user@R2# show
interface so-0/0/0.0 {
level 2 metric 10;
level 1 disable;
}
interface so-0/0/1.0 {
level 2 disable;
level 1 metric 10;
}
interface so-0/0/2.0 {
level 2 metric 10;
level 1 disable;
}
interface fxp0.0 {
disable;
}
interface lo0.0;
[edit protocols isis]
user@R2# run show isis interface
IS-IS interface database:
Interface
L CirID Level 1 DR
lo0.0
0
0x1 Passive
so-0/0/0.0
2
0x1 Disabled
so-0/0/1.0
3
0x1 Point to Point
so-0/0/2.0
2
0x1 Disabled
[edit interfaces]
user@R2# show
so-0/0/0 {
unit 0 {
family inet {
address 10.1.12.2/30;
}
family iso;
}
}
so-0/0/1 {
unit 0 {
family inet {
address 10.1.23.1/30;
}
family iso;
}
}
so-0/0/2 {
unit 0 {
family inet {
address 10.1.26.1/30;
}

Copyright 2015, Juniper Networks, Inc.

Level 2 DR
Passive
Point to Point
Point to Point
Point to Point

L1/L2 Metric
0/0
10/10
10/10
10/10

289

IS-IS Feature Guide for Routing Devices

family iso;
}
}
lo0 {
unit 0 {
family inet {
address 10.0.0.2/32;
}
family iso {
address 49.0002.1000.0000.0002.00;
}
}
}

Meaning

The sample output shows a basic configuration of IS-IS on R2, a Level 1/Level 2 router.
The basic configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] level, five interfaces are included: so-0/0/0, so-0/0/1, so-0/0/2,
fxp0, and the loopback interface (lo0). Two interfaces, so-0/0/0.0 and so-0/0/2.0,
have Level 1 disabled, making them Level 2 interfaces. One interface, so-0/0/1.0, has
Level 2 disabled, making it a Level 1 interface. The management interface (fxp0) is
disabled so that IS-IS packets are not sent over it, and the loopback interface (lo0) is
included because it becomes a point of connection from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, all of the interfaces included in the [edit protocols
isis] hierarchy level are configured with family iso, and the loopback interface (lo0) is
configured with the NET address 49.0002.1000.0000.0002.00. Every router in an IS-IS
network must have at least one NET address that identifies a point of connection to the
IS-IS network. The NET address is generally configured on the loopback interface (lo0).
Routers that participate in multiple areas can have multiple NET addresses.

Check the Configuration of a Level 1 Router


Purpose
Action

To check the configuration of a Level 1 router.


To check the configuration of a Level 1 router, enter the following CLI commands:
user@host# [edit protocols isis] show
user@host# [edit protocols isis] run show isis interface
user@host# [edit] edit interfaces
user@host# [edit interfaces] show

The following sample output is for R4, a Level 1 router in the network shown in The
following output is for an IS-IS configuration on R2, a Level 1/Level 2 router in the network
shown.

Sample Output
[edit protocols isis]
user@R4# show
level 2 disable;
interface so-0/0/2.0 {
level 1 metric 10;
}

290

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

interface fxp0.0 {
disable;
}
interface lo0.0;
[edit protocols isis]
user@R4# run show isis interface
IS-IS interface database:
Interface
L CirID Level 1 DR
lo0.0
0
0x1 Passive
so-0/0/2.0
1
0x1 Point to Point
[edit interfaces]
user@R4# show
so-0/0/2 {
unit 0 {
family inet {
address 10.1.45.1/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 10.0.0.4/32;
}
family iso {
address 49.0001.1000.0000.0004.00;
}
}
}

Meaning

Level 2 DR
Passive
Disabled

L1/L2 Metric
0/0
10/10

The sample output shows a basic configuration of IS-IS on R4, a Level 1 router. The basic
configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] hierarchy level, three interfaces are included: so-0/0/2.0, fxp0,
and the loopback interface (lo0). Level 2 is disabled on the router, making it a Level 1
router that sends packets within its local area, 49.0001. When a packet destination is
outside the local area, R4 establishes an adjacency with the nearest Level 1/Level 2 router
(R5) that forwards the packets. For more information about adjacencies, see Displaying
the Status of IS-IS Adjacencies on page 293.
One interface, so-0/0/2.0, is configured for IS-IS. The management interface (fxp0) is
disabled so that IS-IS packets are not sent over it, and the loopback interface (lo0) is
included because it becomes a point of connection from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, the interface included in the [edit protocols isis]
hierarchy level is also configured with family iso, and the loopback interface (lo0) is
configured with the NET address of 49.0001.1000.0000.0004.00. Every router in an
IS-IS network must have at least one NET address that identifies a point of connection
to the IS-IS network. The NET address is generally configured on the loopback interface
(lo0). Routers that participate in multiple areas can have multiple NET addresses.

Check the Configuration of a Level 2 Router


Purpose

Check the configuration of a Level 2 router.

Copyright 2015, Juniper Networks, Inc.

291

IS-IS Feature Guide for Routing Devices

Action

To check the configuration of a Level 2 router, enter the following CLI commands:
user@host# [edit protocols isis] show
user@host# [edit protocols isis] run show isis interface
user@host# [edit] edit interfaces
user@host# [edit interfaces] show

The following sample output is for R6, a Level 2 router in the network shown.

Sample Output
[edit protocols isis]
user@R6# show
level 1 disable;
interface so-0/0/0.0 {
level 2 metric 10;
}
interface so-0/0/2.0 {
level 2 metric 10;
}
interface fxp0.0 {
disable;
}
interface lo0.0;
[edit protocols isis]
user@R6# run show isis interface
IS-IS interface database:
Interface
L CirID
lo0.0
0
0x1
so-0/0/0.0
2
0x1
so-0/0/2.0
2
0x1

Level 1 DR
Passive
Disabled
Disabled

Level 2 DR
Passive
Point to Point
Point to Point

L1/L2 Metric
0/0
10/10
10/10

[edit interfaces]
user@R6# show
so-0/0/0 {
unit 0 {
family inet {
address 10.1.56.2/30;
}
family iso;
}
}
so-0/0/2 {
unit 0 {
family inet {
address 10.1.26.2/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 10.0.0.6/32;
}
family iso {
address 49.0003.1000.0000.0006.00;
}
}
}

292

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Meaning

The sample output shows a basic configuration of IS-IS on R6, a Level 2 router. The basic
configuration is at the [edit protocols isis] and [edit interfaces] hierarchy levels.
At the [edit protocols isis] level, four interfaces are included: so-0/0/0.0, so-0/0/2.0,
fxp0, and the loopback interface (lo0). Level 1 is disabled on the two SONET/SDH
interfaces, making this a Level 2 router that routes between areas and toward other ASs.
The management interface (fxp0) is disabled so that IS-IS packets are not sent over it,
and the loopback interface (lo0) is included because it becomes a point of connection
from the router to the IS-IS network.
At the [edit interfaces] hierarchy level, the interfaces included in the [edit protocols isis]
hierarchy level are also configured with family iso, and the loopback interface (lo0) is
configured with the NET address of 49.0003.1000.0000.0006.00. Every router in an
IS-IS network must have at least one NET address that identifies a point of connection
to the IS-IS network. The NET address is generally configured on the loopback interface
(lo0). Routers that participate in multiple areas can have multiple NET addresses.

Related
Documentation

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Displaying the Status of IS-IS Adjacencies


Purpose

Assuming that all the routers are correctly configured for IS-IS, you can verify which
neighbors are adjacent and able to exchange IS-IS data. In addition, you can examine
the set of routes installed in the forwarding table to verify that the routing protocol process
(rpd) has relayed the correct information into the forwarding table.
Figure 39 on page 294 illustrates the example IS-IS topology used for the procedures in
this topic.

Copyright 2015, Juniper Networks, Inc.

293

IS-IS Feature Guide for Routing Devices

Figure 39: IS-IS Network Topology

The network consists of Level 1 and Level 2 adjacencies. Level 1 adjacencies are within
areas 49.0001 and 49.0002. Level 2 adjacencies occur between all directly connected
Level 2 routers regardless of which area they are in. For example, R5 is in area 49.0001,
R6 is in area 49.0003, R1 is in area 49.0004, and R2 is in area 49.0002. The network in
Figure 39 on page 294 should have the following adjacencies:

Level 2 adjacencies between all directly connected Level 2 routers (R1, R2, R5, and R6).

Level 1 adjacencies between routers in area 49.0001 (R4 and R5) and between routers
in area 49.0002 (R2 and R3).

To verify that routers are adjacent and able to exchange IS-IS data, follow these steps:

Displaying Detailed IS-IS Protocol Information


Action

To trace IS-IS messages in detail, follow these steps:


1.

Configure the flag to display detailed IS-IS protocol messages.


[edit protocols isis traceoptions]
user@host# set flag hello detail

2. Verify the configuration.

user@host# show

For example:
[edit protocols isis traceoptions]
user@host# show

294

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

file isislog size 10k files 10;


flag hello detail;
3. Commit the configuration.

user@host# commit
4. View the contents of the file containing the detailed messages.

user@host# run show log filename

For example:
user@host# run show log isislog
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov
Nov

Meaning

29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29
29

23:17:50
23:17:50
23:17:53
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:54
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55
23:17:55

trace_on: Tracing to "/var/log/isislog"


Sending PTP IIH on so-1/1/1.0
Sending PTP IIH on so-1/1/0.0
Received PTP IIH, source id abc-core-01
from interface index 11
max area 0, circuit type l2, packet
hold time 30, circuit id 6
neighbor state up
speaks IP
area address 99.0008 (1)
IP address 10.10.10.29
4396 bytes of total padding
updating neighbor abc-core-01
Received PTP IIH, source id abc-core-02
from interface index 12
max area 0, circuit type l2, packet
hold time 30, circuit id 6
neighbor state up
speaks IP
area address 99.0000 (1)
IP address 10.10.10.33
4396 bytes of total padding
updating neighbor abc-core-02

started

on so-1/1/0.0
length 4469

on so-1/1/1.0
length 4469

Table 8 on page 295 lists tracing flags that can be configured specific to IS-IS and presents
example output for some of the flags.

Table 8: IS-IS Protocol Tracing Flags


Tracing Flags

Description

Example Output

csn

Complete sequence
number PDU (CSNP)

Nov 28 20:02:48 Sending L2 CSN on interface so-1/1/0.0Nov 28 20:02:48 Sending L2 CSN


on interface so-1/1/1.0

With the detail option.


Nov 28 20:06:08 Sending L2 CSN on interface so-1/1/1.0Nov 28 20:06:08 LSP
abc-core-01.00-00 lifetime 1146Nov 28 20:06:08 sequence 0x1c4f8 checksum 0xa1e9Nov
28 20:06:08 LSP abc-core-02.00-00 lifetime 411Nov 28 20:06:08 sequence 0x7435
checksum 0x5424Nov 28 20:06:08 LSP abc-brdr-01.00-00 lifetime 465Nov 28 20:06:08
sequence 0xf73 checksum 0xab10Nov 28 20:06:08 LSP abc-edge-01.00-00 lifetime
1089Nov 28 20:06:08 sequence 0x1616 checksum 0xdb29Nov 28 20:06:08 LSP
abc-edge-02.00-00 lifetime 1103Nov 28 20:06:08 sequence 0x45cc checksum 0x6883

Copyright 2015, Juniper Networks, Inc.

295

IS-IS Feature Guide for Routing Devices

Table 8: IS-IS Protocol Tracing Flags (continued)


Tracing Flags

Description

Example Output

hello

Hello packet

Nov 28 20:13:50 Sending PTP IIH on so-1/1/1.0Nov 28 20:13:50 Received PTP IIH, source
id abc-core-01 on so-1/1/0.0Nov 28 20:13:53 Received PTP IIH, source id abc-core-02 on
so-1/1/1.0Nov 28 20:13:57 Sending PTP IIH on so-1/1/0.0Nov 28 20:13:58 Received PTP IIH,
source id abc-core-01 on so-1/1/0.0Nov 28 20:13:59 Sending PTP IIH on so-1/1/1.0

lsp

Link-state PDUs
(LSPs)

Nov 28 20:15:46 Received L2 LSP abc-edge-01.00-00, interface so-1/1/0.0Nov 28 20:15:46


from abc-core-01Nov 28 20:15:46 sequence 0x1617, checksum 0xd92a, lifetime 1197Nov
28 20:15:46 Updating L2 LSP abc-edge-01.00-00 in TEDNov 28 20:15:47 Received L2 LSP
abc-edge-01.00-00, interface so-1/1/1.0Nov 28 20:15:47 from abc-core-02Nov 28 20:15:47
sequence 0x1617, checksum 0xd92a, lifetime 1197

lsp-generation

Link-state PDU
generation packets

Nov 28 20:21:24 Regenerating L1 LSP abc-edge-03.00-00, old sequence 0x682Nov 28


20:21:27 Rebuilding L1, fragment abc-edge-03.00-00Nov 28 20:21:27 Rebuilt L1 fragment
abc-edge-03.00-00, size 59Nov 28 20:31:52 Regenerating L2 LSP abc-edge-03.00-00,
old sequence 0x689Nov 28 20:31:54 Rebuilding L2, fragment abc-edge-03.00-00Nov 28
20:31:54 Rebuilt L2 fragment abc-edge-03.00-00, size 256Nov 28 20:34:05 Regenerating
L1 LSP abc-edge-03.00-00, old sequence 0x683Nov 28 20:34:08 Rebuilding L1, fragment
abc-edge-03.00-00Nov 28 20:34:08 Rebuilt L1 fragment abc-edge-03.00-00, size 59

packets

All IS-IS protocol


packets

Not available.

psn

Partial sequence
number PDU (PSNP)
packets

Nov 28 20:40:39 Received L2 PSN, source abc-core-01, interface so-1/1/0.0Nov 28 20:40:39


Received L2 PSN, source abc-core-02, interface so-1/1/1.0Nov 28 20:41:36 Sending L2 PSN
on interface so-1/1/1.0Nov 28 20:41:36 Sending L2 PSN on interface so-1/1/0.0Nov 28
20:42:35 Received L2 PSN, source abc-core-02, interface so-1/1/1.0Nov 28 20:42:35 LSP
abc-edge-03.00-00 lifetime 1196Nov 28 20:42:35 sequence 0x68c checksum 0x746dNov
28 20:42:35 Received L2 PSN, source abc-core-01, interface so-1/1/0.0Nov 28 20:42:35
LSP abc-edge-03.00-00 lifetime 1196Nov 28 20:42:35 sequence 0x68c checksum
0x746dNov 28 20:42:49 Sending L2 PSN on interface so-1/1/1.0Nov 28 20:42:49 LSP
abc-core-01.00-00 lifetime 1197Nov 28 20:42:49 sequence 0x1c4fb checksum 0x9becNov
28 20:42:49 Sending L2 PSN on interface so-1/1/0.0Nov 28 20:42:49 LSP
abc-core-01.00-00 lifetime 1197Nov 28 20:42:49 sequence 0x1c4fb checksum 0x9bec

spf

Shortest-path-first
(SPF) calculations

Nov 28 20:44:01 Scheduling SPF for L1: ReconfigNov 28 20:44:01 Scheduling multicast
SPF for L1: ReconfigNov 28 20:44:01 Scheduling SPF for L2: ReconfigNov 28 20:44:01
Scheduling multicast SPF for L2: ReconfigNov 28 20:44:02 Running L1 SPFNov 28 20:44:02
L1 SPF initialization complete: 0.000099s cumulative timeNov 28 20:44:02 L1 SPF primary
processing complete: 0.000303s cumulative timeNov 28 20:44:02 L1 SPF result
postprocessing complete: 0.000497s cumulative timeNov 28 20:44:02 L1 SPF RIB
postprocessing complete: 0.000626s cumulative timeNov 28 20:44:02 L1 SPF routing
table postprocessing complete: 0.000736s cumulative time

Related
Documentation

296

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

Analyzing IS-IS Link-State PDUs in Detail


To analyze IS-IS link-state PDUs in detail, follow these steps:
1.

Configure IS-IS open messages.


[edit protocols isis traceoptions]
user@host# set flag lsp detail

2. Verify the configuration.

user@host# show

For example:
[edit protocols isis traceoptions]
user@host# show
file isislog size 5m world-readable;
flag error;
flag lsp detail;
3. Commit the configuration.

user@host# commit
4. View the contents of the file containing the detailed messages.

user@host# run show log filename

For example:
user@host# run show log isislog
Nov 28 20:17:24 Received L2 LSP abc-core-01.00-00, interface so-1/1/0.0
Nov 28 20:17:24
from abc-core-01
Nov 28 20:17:24
sequence 0x1c4f9, checksum 0x9fea, lifetime 1199
Nov 28 20:17:24
max area 0, length 426
Nov 28 20:17:24
no partition repair, no database overload
Nov 28 20:17:24
IS type 3, metric type 0
Nov 28 20:17:24
area address 99.0908 (1)
Nov 28 20:17:24
speaks CLNP
Nov 28 20:17:24
speaks IP
Nov 28 20:17:24
dyn hostname abc-core-01
Nov 28 20:17:24
IP address 10.10.134.11
Nov 28 20:17:24
IP prefix: 10.10.10.0/30 metric 1 up
Nov 28 20:17:24
IP prefix: 10.10.10.4/30 metric 5 up
Nov 28 20:17:24
IP prefix: 10.10.10.56/30 metric 5 up
Nov 28 20:17:24
IP prefix: 10.10.10.52/30 metric 1 up
Nov 28 20:17:24
IP prefix: 10.10.10.64/30 metric 5 up
Nov 28 20:17:24
IP prefix: 10.10.10.20/30 metric 5 up
Nov 28 20:17:24
IP prefix: 10.10.10.28/30 metric 5 up
Nov 28 20:17:24
IP prefix: 10.10.10.44/30 metric 5 up
Nov 28 20:17:24
IP prefix 10.10.10.0 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 1
Nov 28 20:17:24
IP prefix 10.10.10.4 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.10.10.56 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.10.10.52 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 1
Nov 28 20:17:24
IP prefix 10.10.10.64 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.10.10.20 255.255.255.252

Copyright 2015, Juniper Networks, Inc.

297

IS-IS Feature Guide for Routing Devices

Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.10.10.28 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.10.10.44 255.255.255.252
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IS neighbors:
Nov 28 20:17:24
IS neighbor abc-core-02.00
Nov 28 20:17:24
internal, metrics: default 1
[...Output truncated...]
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IS neighbor abc-brdr-01.00
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IS neighbor abc-core-02.00, metric: 1
Nov 28 20:17:24
IS neighbor abc-esr-02.00, metric: 5
Nov 28 20:17:24
IS neighbor abc-edge-03.00, metric: 5
Nov 28 20:17:24
IS neighbor abc-edge-01.00, metric: 5
Nov 28 20:17:24
IS neighbor abc-edge-02.00, metric: 5
Nov 28 20:17:24
IS neighbor abc-brdr-01.00, metric: 5
Nov 28 20:17:24
IP prefix: 10.10.134.11/32 metric 0 up
Nov 28 20:17:24
IP prefix: 10.11.0.0/16 metric 5 up
Nov 28 20:17:24
IP prefix: 10.211.0.0/16 metric 0 up
Nov 28 20:17:24
IP prefix 10.10.134.11 255.255.255.255
Nov 28 20:17:24
internal, metrics: default 0
Nov 28 20:17:24
IP prefix 10.11.0.0 255.255.0.0
Nov 28 20:17:24
internal, metrics: default 5
Nov 28 20:17:24
IP prefix 10.211.0.0 255.255.0.0
Nov 28 20:17:24
internal, metrics: default 0
Nov 28 20:17:24
Updating LSP
Nov 28 20:17:24 Updating L2 LSP abc-core-01.00-00 in TED
Nov 28 20:17:24 Analyzing subtlv's for abc-core-02.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24 Analyzing subtlv's for abc-esr-02.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24 Analyzing subtlv's for abc-edge-03.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24 Analyzing subtlv's for abc-edge-01.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24 Analyzing subtlv's for abc-edge-02.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24 Analyzing subtlv's for abc-brdr-01.00
Nov 28 20:17:24 Analysis complete
Nov 28 20:17:24
Scheduling L2 LSP abc-core-01.00-00 sequence 0x1c4f9 on
interface so-1/1/1.0

Related
Documentation

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Displaying Sent or Received IS-IS Protocol Packets


To configure the tracing for only sent or received IS-IS protocol packets, follow these
steps:
1.

Configure the flag to display sent, received, or both sent and received packets.
[edit protocols isis traceoptions]

298

Copyright 2015, Juniper Networks, Inc.

Chapter 14: Troubleshooting IS-IS

user@host# set flag hello send

or
[edit protocols isis traceoptions]
user@host# set flag hello receive

or
[edit protocols isis traceoptions]
user@host# set flag hello
2. Verify the configuration.

user@host# show

For example:
[edit protocols isis traceoptions]
user@host# show
file isislog size 10k files 10;
flag hello send;

or
[edit protocols isis traceoptions]
user@host# show
file isislog size 10k files 10;
flag hello receive;

or
[edit protocols isis traceoptions]
user@host# show
file isislog size 10k files 10;
flag hello send receive;
3. Commit the configuration.

user@host# commit
4. View the contents of the file containing the detailed messages.

user@host# run show log filename

For example:
user@host# run show log isislog
Sep 27 18:17:01 ISIS periodic
Sep 27 18:17:01 ISIS periodic
Sep 27 18:17:03 ISIS periodic
Sep 27 18:17:04 ISIS periodic
Sep 27 18:17:06 ISIS L2 hello
Sep 27 18:17:06 ISIS periodic
Sep 27 18:17:06 ISIS L1 hello

Related
Documentation

xmit
xmit
xmit
xmit
from
xmit
from

to 01:80:c2:00:00:15 (IFL 2)
to 01:80:c2:00:00:14 (IFL 2)
to 01:80:c2:00:00:15 (IFL 2)
to 01:80:c2:00:00:14 (IFL 2)
0000.0000.0008 (IFL 2) absorbed
to 01:80:c2:00:00:15 (IFL 2)
0000.0000.0008 (IFL 2) absorbed

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

299

IS-IS Feature Guide for Routing Devices

300

Copyright 2015, Juniper Networks, Inc.

CHAPTER 15

Routing Protocol Process Memory FAQs

Routing Protocol Process Memory FAQs on page 301

Routing Protocol Process Memory FAQs


The following sections present the most frequently asked questions and answers related
to the routing protocol process memory utilization, operation, interpretation of related
command outputs, and troubleshooting the software process.

Routing Protocol Process Overview


Junos OS is based on the FreeBSD Unix operating system. The open source software is
modified and hardened to operate in the devices specialized environment. For example,
some executables have been deleted, while other utilities were de-emphasized.
Additionally, certain software processes were added to enhance the routing functionality.
The result of this transformation is the kernel, the heart of the Junos OS software.
The kernel is responsible for operating multiple processes that perform the actual
functions of the device. Each process operates in its own protected memory space, while
the communication among all the processes is still controlled by the kernel. This
separation provides isolation between the processes, and resiliency in the event of a
process failure. This is important in a core routing platform because a single process
failure does not cause the entire device to cease functioning.
Some of the common software processes include the routing protocol process (rpd)
that controls the devices protocols, the device control process (dcd) that controls the
devices interfaces, the management process (mgd) that controls user access to the
device, the chassis process (chassisd) that controls the devices properties itself, and
the Packet Forwarding Engine process (pfed) that controls the communication between
the devices Packet Forwarding Engine and the Routing Engine. The kernel also generates
specialized processes as needed for additional functionality, such as SNMP, the Virtual
Router Redundancy Protocol (VRRP), and Class of Service (CoS).
The routing protocol process is a software process within the Routing Engine software,
which controls the routing protocols that run on the device. Its functionality includes all
protocol messages, routing table updates, and implementation of routing policies.
The routing protocol process starts all configured routing protocols and handles all
routing messages. It maintains one or more routing tables, which consolidate the routing

Copyright 2015, Juniper Networks, Inc.

301

IS-IS Feature Guide for Routing Devices

information learned from all routing protocols. From this routing information, the routing
protocol process determines the active routes to network destinations and installs these
routes into the Routing Engines forwarding table. Finally, it implements routing policy,
which allows you to control the routing information that is transferred between the routing
protocols and the routing table. Using routing policy, you can filter and limit the transfer
of information as well as set properties associated with specific routes.

Frequently Asked Questions: Routing Protocol Process Memory


This section presents frequently asked questions and answers related to the memory
usage of the routing protocol process.
Why does the routing protocol process use excessive memory?
The routing protocol process uses hundreds of megabytes of RAM in the Routing Engine
to store information needed for the operation of routing and related protocols, such as
BGP, OSPF, IS-IS, RSVP, LDP and MPLS. Such huge consumption of memory is common
for the process, as the information it stores includes routes, next hops, interfaces, routing
policies, labels, and label-switched paths (LSPs). Because access to the RAM memory
is much faster than access to the hard disk, most of the routing protocol process
information is stored in the RAM memory instead of using the hard disk space. This ensures
that the performance of the routing protocol process is maximized.
How can I check the amount of memory the routing protocol process is using?
You can check routing protocol process memory usage by entering the show system
processes and the show task memory Junos OS command-line interface (CLI) operational
mode commands.
The show system processes command displays information about software processes
that are running on the device and that have controlling terminals. The show task memory
command displays memory utilization for routing protocol tasks on the Routing Engine.
You can check the routing protocol process memory usage by using the show system
processes command with the extensive option. The show task memory command displays
a report generated by the routing protocol process on its own memory usage. However,
this report does not display all the memory used by the process. The value reported by
the routing protocol process does not account for the memory used for the TEXT and
STACK segments, or the memory used by the processs internal memory manager. Further,
the Resident Set Size value includes shared library pages used by the routing protocol
process.
For more information about checking the routing protocol process memory usage.
For more information, see the show system processes command and the show task
memory command.
I just deleted a large number of routes from the routing protocol process. Why is it still
using so much memory?
The show system processes extensive command displays a RES value measured in
kilobytes. This value represents the amount of program memory resident in the physical

302

Copyright 2015, Juniper Networks, Inc.

Chapter 15: Routing Protocol Process Memory FAQs

memory. This is also known as RSS or Resident Set Size. The RES value includes shared
library pages used by the process. Any amount of memory freed by the process might
still be considered part of the RES value. Generally, the kernel delays the migrating of
memory out of the Inact queue into the Cache or Free list unless there is a memory
shortage. This can lead to large discrepancies between the values reported by the routing
protocol process and the kernel, even after the routing protocol process has freed a large
amount of memory.

Frequently Asked Questions: Interpreting Routing Protocol Process-Related Command Outputs


This section presents frequently asked questions and answers about the routing protocol
process-related Junos OS command-line interface (CLI) command outputs that are
used to display the memory usage of the routing protocol process.
How do I interpret memory numbers displayed in the show system processes extensive
command output?
The show system processes extensive command displays exhaustive system process
information about software processes that are running on the device and have controlling
terminals. This command is equivalent to the UNIX top command. However, the UNIX
top command shows real-time memory usage, with the memory values constantly
changing, while the show system processes extensive command provides a snapshot of
memory usage in a given moment.
To check overall CPU and memory usage, enter the show system processes extensive
command. Refer to Table 9 on page 304 for information about the show system processes
extensive commands output fields.
user@host> show system processes extensive
last pid:
544; load averages: 0.00,
37 processes: 1 running, 36 sleeping

0.00,

0.00

18:30:33

Mem: 25M Active, 3968K Inact, 19M Wired, 184K Cache, 8346K Buf,
Swap: 528M Total, 64K Used, 528M Free
PID USERNAME PRI NICE SIZE
RES STATE
TIME
WCPU
CPU
544 root
30
0
604K
768K RUN
0:00 0.00% 0.00%
3 root
28
0
0K
12K psleep
0:00 0.00% 0.00%
4 root
28
0
0K
12K update
0:03 0.00% 0.00%
528 aviva
18
0
660K
948K pause
0:00 0.00% 0.00%
204 root
18
0
300K
544K pause
0:00 0.00% 0.00%
131 root
18
0
332K
532K pause
0:00 0.00% 0.00%
186 root
18
0
196K
68K pause
0:00 0.00% 0.00%
27 root
10
0
512M 16288K mfsidl
0:00 0.00% 0.00%
1 root
10
0
620K
344K wait
0:00 0.00% 0.00%
304 root
3
0
884K
900K ttyin
0:00 0.00% 0.00%
200 root
3
0
180K
540K ttyin
0:00 0.00% 0.00%
203 root
3
0
180K
540K ttyin
0:00 0.00% 0.00%
202 root
3
0
180K
540K ttyin
0:00 0.00% 0.00%
201 root
3
0
180K
540K ttyin
0:00 0.00% 0.00%
194 root
2
0 2248K 1640K select
0:11 0.00% 0.00%
205 root
2
0
964K
800K select
0:12 0.00% 0.00%
189 root
2 -12
352K
740K select
0:03 0.00% 0.00%
114 root
2
0
296K
612K select
0:00 0.00% 0.00%
188 root
2
0
780K
600K select
0:00 0.00% 0.00%
527 root
2
0
176K
580K select
0:00 0.00% 0.00%
195 root
2
0
212K
552K select
0:00 0.00% 0.00%

Copyright 2015, Juniper Networks, Inc.

202M Free
COMMAND
top
vmdaemon
update
tcsh
csh
cron
watchdog
mount_mfs
init
bash
getty
getty
getty
getty
rpd
tnp.chassisd
xntpd
amd
dcd
rlogind
inetd

303

IS-IS Feature Guide for Routing Devices

187
83
538
99
163
192
191
537
193
5
2
0

root
root
root
daemon
root
root
root
aviva
root
root
root
root

2
2
2
2
2
2
2
2
2
2
-18
-18

0
0
0
0
0
0
0
0
0
0
0
0

192K
188K
1324K
176K
572K
560K
1284K
636K
312K
0K
0K
0K

532K
520K
516K
492K
420K
400K
376K
364K
204K
12K
12K
0K

select
select
select
select
select
select
select
select
select
pfesel
psleep
sched

0:00
0:00
0:00
0:00
0:00
0:10
0:00
0:00
0:07
0:00
0:00
0:00

0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%

0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%

tnetd
syslogd
mgd
portmap
nsrexecd
snmpd
mgd
cli
mib2d
if_pfe
pagedaemon
swapper

Table 9 on page 304 describes the output fields that represent the memory values for the
show system processes extensive command. Output fields are listed in the approximate
order in which they appear.

Table 9: show system processes extensive Output Fields


Field Name

Field Description

Mem

Information about physical and virtual memory allocation.

Active

Memory allocated and actively used by the program.

Inact

Memory allocated but not recently used or memory freed by the programs. Inactive memory remains
mapped in the address space of one or more processes and, therefore, counts toward the RSS value
of those processes.

Wired

Memory that is not eligible to be swapped, usually used for in-kernel memory structures and/or memory
physically locked by a process.

Cache

Memory that is not associated with any program and does not need to be swapped before being reused.

Buf

Size of memory buffer used to hold data recently called from the disk.

Free

Memory that is not associated with any programs. Memory freed by a process can become Inactive,
Cache, or Free, depending on the method used by the process to free the memory.

Swap

Information about swap memory.

TotalTotal memory available to be swapped to disk.

UsedMemory swapped to disk.

FreeMemory available for further swap.

The rest of the command output displays information about the memory usage of each
process. The SIZE field indicates the size of the virtual address space, and the RES field
indicates the amount of the program in physical memory, which is also known as RSS or
Resident Set Size. For more information, see the show system processes command.
What is the difference between Active and Inact memory that is displayed by the show
system processes extensive command?

304

Copyright 2015, Juniper Networks, Inc.

Chapter 15: Routing Protocol Process Memory FAQs

When the system is under memory pressure, the pageout process reuses memory from
the free, cache, inact and, if necessary, active pages. When the pageout process runs, it
scans memory to see which pages are good candidates to be unmapped and freed up.
Thus, the distinction between Active and Inact memory is only used by the pageout
process to determine which pool of pages to free first at the time of a memory shortage.
The pageout process first scans the Inact list, and checks whether the pages on this list
have been accessed since the time they have been listed here. The pages that have been
accessed are moved from the Inact list to the Active list. On the other hand, pages that
have not been accessed become prime candidates to be freed by the pageout process.
If the pageout process cannot produce enough free pages from the Inact list, pages from
the Active list get freed up.
Because the pageout process runs only when the system is under memory pressure, the
pages on the Inact list remain untouched even if they have not been accessed recently
when the amount of Free memory is adequate.
How do I interpret memory numbers displayed in the show task memory command
output?
The show task memory command provides a comprehensive picture of the memory
utilization for routing protocol tasks on the Routing Engine. The routing protocol process
is the main task that uses Routing Engine memory.
To check routing process memory usage, enter the show task memory command. Refer
to Table 10 on page 305 for information about the show task memory command output
fields.
user@host> show task memory
Memory
Size (kB)
Currently In Use:
29417
Maximum Ever Used:
33882
Available:
756281

%Available
3%
4%
100%

When
now
00/02/11 22:07:03
now

Table 10 on page 305 describes the output fields for the show task memory command.
Output fields are listed in the approximate order in which they appear.

Table 10: show task memory Output Fields


Field Name

Field Description

Memory Currently In Use

Memory currently in use. Dynamically allocated memory plus the DATA


segment memory in kilobytes.

Memory Maximum Ever Used

Maximum memory ever used.

Memory Available

Memory currently available.

The show task memory command does not display all the memory used by the routing
protocol process. This value does not account for the memory used for the TEXT and
STACK segments, or the memory used by the routing protocol processs internal memory
manager.

Copyright 2015, Juniper Networks, Inc.

305

IS-IS Feature Guide for Routing Devices

Why is the Currently In Use value less than the RES value?
The show task memory command displays a Currently In Use value measured in kilobytes.
This value represents the memory currently in use. It is the dynamically allocated memory
plus the DATA segment memory. The show system processes extensive command displays
a RES value measured in kilobytes. This value represents the amount of program memory
resident in the physical memory. This is also known as RSS or Resident Set Size.
The Currently In Use value does not account for all of the memory that the routing protocol
process uses. This value does not include the memory used for the TEXT and the STACK
segments, and a small percentage of memory used by the routing protocol processs
internal memory manager. Further, the RES value includes shared library pages used by
the routing protocol process.
Any amount of memory freed by the routing protocol process might still be considered
part of the RES value. Generally, the kernel delays the migrating of memory out of the
Inact queue into the Cache or Free list unless there is a memory shortage. This can lead
to large discrepancies between the Currently In Use value and the RES value.

Frequently Asked Questions: Routing Protocol Process Memory Swapping


This section presents frequently asked questions and answers related to the memory
swapping of the routing protocol process from the Routing Engine memory to the hard
disk memory.
How do I monitor swap activity?
When the system is under memory pressure, the pageout process reuses memory from
the free, cache, inact and, if necessary, active pages. You can monitor the swap activity
by viewing the syslog message reported by the kernel during periods of high pageout
activity.
The syslog message appears as follows:
Mar

3 20:08:02 olympic /kernel: High pageout rate!! 277 pages/sec.

You can use the vmstat -s command to print the statistics for the swapout activity. The
displayed statistics appear as follows:
0 swap pager pageouts
0 swap pager pages paged out

The swap pager pageouts is the number of pageout operations to the swap device, and
the swap pager pages paged out is the number of pages paged out to the swap device.
Why does the system start swapping when I try to dump core using the request system
core-dumps command?
The request system core-dumps command displays a list of system core files created
when the device has failed. This command can be useful for diagnostic purposes. Each
list item includes the file permissions, number of links, owner, group, size, modification
date, path, and filename. You can use the core-filename option and the core-file-info,
brief, and detail options to display more information about the specified core-dump files.

306

Copyright 2015, Juniper Networks, Inc.

Chapter 15: Routing Protocol Process Memory FAQs

You can use the request system core-dumps command to perform a non-fatal core-dump
without aborting the routing protocol process. To do this, the routing protocol process
is forked, generating a second copy, and then aborted. This process can double the
memory consumed by the two copies of the routing protocol processes, pushing the
system into swap.
Why does the show system processes extensive command show that memory is swapped
to disk although there is plenty of free memory?
Memory can remain swapped out indefinitely if it is not accessed again. Therefore, the
show system processes extensive command shows that memory is swapped to disk even
though there is plenty of free memory, and such a situation is not unusual.

Frequently Asked Questions: Troubleshooting the Routing Protocol Process


This section presents frequently asked questions and answers related to a shortage of
memory and memory leakage by the routing protocol process.
What does the RPD_OS_MEMHIGH message mean?
The RPD_OS_MEMHIGH message is written into the system message file if the routing
protocol process is running out of memory. This message alerts you that the routing
protocol process is using the indicated amount and percentage of Routing Engine memory,
which is considered excessive. This message is generated either because the routing
protocol process is leaking memory or the use of system resources is excessive, perhaps
because routing filters are misconfigured or the configured network topology is very
complex.
When the memory utilization for the routing protocol process is using all available Routing
Engine DRAM memory (Routing Engines with maximum 2 GB DRAM) or reaches the limit
of 2 GB of memory (Routing Engines with 4 GB DRAM), a message of the following form
is written every minute in the syslog message file:
RPD_OS_MEMHIGH: Using 188830 KB of memory, 100 percent of available

This message includes the amount, in kilobytes and/or the percentage, of the available
memory in use.
This message should not appear under normal conditions, as any further memory
allocations usually require a portion of existing memory to be written to swap. As a
recommended solution, increase the amount of RAM in the Routing Engine. For more
information, go to http://kb.juniper.net/InfoCenter/index?page=content&id=KB14186 .
What can I do when there is a memory shortage even after a swap?
It is not recommended for the system to operate in this state, notwithstanding the
existence of swap. The protocols that run in the routing protocol process usually have a
real-time requirement that cannot reliably withstand the latency of being swapped to
hard disk. If the memory shortage has not resulted from a memory leak, then either a
reduction in the memory usage or an upgrade to a higher memory-capacity Routing
Engine is required.
How do I determine whether there is a memory leak in the routing protocol process?

Copyright 2015, Juniper Networks, Inc.

307

IS-IS Feature Guide for Routing Devices

Memory leaks are typically the result of a seemingly unbounded growth in the memory
usage of a process as reported by the show system processes extensive command.
There are two classes of memory leaks that the routing protocol process can experience.

The first class occurs when the allocated memory that is no longer in use is not freed.
This class of leak can usually be fixed by taking several samples of the show task
memory detail command over a period of time and comparing the deltas.

The second class occurs when there is a late access to freed memory. If the access is
not outside the mapped address space, the kernel backfills the accessed page with
real memory. This backfill is done without the knowledge of the routing protocol
processs internal memory allocator, which makes this class of leak much more difficult
to resolve. If a memory leak of this class is suspected, writing the state of the system
to a disk file (creating a core file) is suggested.

A large discrepancy between the RES value and the Currently In Use value might indicate
a memory leak. However, large discrepancies can also occur for legitimate reasons. For
example, the memory used for the TEXT and STACK segments or the memory used by
the routing protocol processs internal memory manager might not be displayed. Further,
the RES value includes shared library pages used by the process.
What is the task_timer?
The source of a routing protocol process memory leak can usually be identified by dumping
the timers for each task. You can use the show task task-name command to display
routing protocol tasks on the Routing Engine. Tasks can be baseline tasks performed
regardless of the devices configuration, and other tasks that depend on the device
configuration.
For more information, see the show task command.
Related
Documentation

308

Routing Protocol Process Overview

Copyright 2015, Juniper Networks, Inc.

PART 4

Configuration Statements and


Operational Commands

Configuration Statements on page 311

Operational Commands on page 417

Copyright 2015, Juniper Networks, Inc.

309

IS-IS Feature Guide for Routing Devices

310

Copyright 2015, Juniper Networks, Inc.

CHAPTER 16

Configuration Statements

[edit protocols isis] Hierarchy Level on page 313

admin-group on page 317

authentication-key (Protocols IS-IS) on page 319

authentication-key-chain (Protocols IS-IS) on page 320

authentication-type (Protocols IS-IS) on page 321

backup-selection (Protocols ISIS) on page 322

backup-spf-options (Protocols IS-IS) on page 323

bfd-liveness-detection (Protocols IS-IS) on page 324

checksum (Protocols IS-IS) on page 326

clns-routing on page 327

clns-updown-compatibility on page 328

context-identifier (Protocols IS-IS) on page 329

csnp-interval on page 330

destination on page 331

disable (Protocols IS-IS) on page 332

disable (LDP Synchronization for IS-IS) on page 333

export (Protocols IS-IS) on page 334

external-preference (Protocols IS-IS) on page 335

family (Protocols IS-IS) on page 336

graceful-restart (Protocols IS-IS) on page 337

hello-authentication-key on page 338

hello-authentication-key-chain on page 339

hello-authentication-type on page 340

hello-interval (Protocols IS-IS) on page 341

hello-padding on page 342

hold-time (Protocols IS-IS) on page 344

hold-time (LDP Synchronization for IS-IS) on page 345

ignore-attached-bit on page 346

Copyright 2015, Juniper Networks, Inc.

311

IS-IS Feature Guide for Routing Devices

312

ignore-lsp-metrics (Protocols IS-IS) on page 347

interface (Protocols IS-IS) on page 348

interface (Protocols ISIS) on page 350

ipv4-multicast on page 353

ipv4-multicast-metric on page 354

ipv6-multicast on page 355

ipv6-multicast-metric on page 355

ipv6-unicast on page 356

ipv6-unicast-metric on page 357

isis on page 358

label-switched-path (Protocols IS-IS) on page 359

ldp-synchronization on page 360

level (Global IS-IS) on page 361

level (IS-IS Interfaces) on page 363

link-protection (Protocols IS-IS) on page 364

loose-authentication-check on page 364

lsp-equal-cost on page 365

lsp-interval on page 366

lsp-lifetime on page 367

max-areas on page 368

max-hello-size on page 369

max-lsp-size on page 370

max-snp-size on page 371

mesh-group (Protocols IS-IS) on page 372

metric (Protocols IS-IS) on page 373

multicast-rpf-routes on page 374

multipath (Protocols IS-IS) on page 375

no-adjacency-down-notification (Protocols IS-IS) on page 376

no-adjacency-holddown on page 377

no-authentication-check on page 378

no-csnp-authentication on page 378

node on page 379

node-tag on page 380

node-link-protection (Protocols IS-IS) on page 381

no-eligible-backup (Protocols IS-IS) on page 382

no-eligible-remote-backup on page 382

no-hello-authentication on page 383

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

no-ipv4-multicast on page 383

no-ipv4-routing on page 384

no-ipv6-multicast on page 385

no-ipv6-routing on page 386

no-ipv6-unicast on page 387

no-psnp-authentication on page 387

no-unicast-topology on page 388

overload (Protocols IS-IS) on page 389

passive (Protocols IS-IS) on page 392

point-to-point on page 393

preference (Protocols IS-IS) on page 394

prefix-export-limit (Protocols IS-IS) on page 395

priority (Protocols IS-IS) on page 396

protocols on page 397

reference-bandwidth (Protocols IS-IS) on page 400

remote-backup-calculation on page 401

rib-group (Protocols IS-IS) on page 402

routing-instances (Multiple Routing Entities) on page 403

shortcuts (Protocols IS-IS) on page 404

spf-options (Protocols IS-IS) on page 405

static-host-mapping on page 407

te-metric (Protocols IS-IS) on page 408

topologies (Protocols IS-IS) on page 409

traceoptions (Protocols IS-IS) on page 410

traffic-engineering (Protocols IS-IS) on page 413

wide-metrics-only on page 416

[edit protocols isis] Hierarchy Level


The following statement hierarchy can also be included at the [edit protocols isis] hierarchy
level.
protocols {
isis {
disable;
clns-routing;
clns-updown-compatibility
context-identifier ip-address</prefix> {
level (1 | 2) <disable>;
}
export [ policy-names ];
graceful-restart {
disable;

Copyright 2015, Juniper Networks, Inc.

313

IS-IS Feature Guide for Routing Devices

helper-disable;
restart-duration seconds;
}
ignore-attached-bit;
interface interface-name {
... the interface subhierarchy appears after the main [edit protocols isis] hierarchy ...
}
label-switched-path name level level metric metric;
level (1 | 2) {
disable;
authentication-key key;
authentication-type authentication;
external-preference preference;
no-csnp-authentication;
no-hello-authentication;
no-psnp-authentication;
preference preference;
prefix-export-limit number;
wide-metrics-only;
}
loose-authentication-check;
lsp-lifetime seconds;
max-areas number;
no-adjacency-holddown;
no-authentication-check;
no-ipv4-routing;
no-ipv6-routing;
overload {
advertise-high-metrics;
timeout seconds;
}
reference-bandwidth reference-bandwidth;
rib-group {
inet group-name;
inet6 group-name;
}
spf-options {
delay milliseconds;
holddown milliseconds;
rapid-runs number;
}
topologies {
ipv4-multicast;
ipv6-multicast;
ipv6-unicast;
}
traceoptions {
file filename <files number> <size maximum-file-size> <world-readable |
no-world-readable>;
flag flag <flag-modifier> <disable>;
}
traffic-engineering {
disable;
family inet {
shortcuts {
multicast-rpf-routes:

314

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

}
}
family inet6 {
shortcuts;
}
}
ignore-lsp-metrics;
}
isis {
interface interface-name {
disable;
bfd-liveness-detection {
authentication {
algorithm (keyed-md5 | keyed-sha-1 | meticulous-keyed-md5 |
meticulous-keyed-sha-1 | simple-password);
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
checksum;
csnp-interval (seconds | disable);
hello-padding (adaptive | loose | strict);
ldp-synchronization {
disable;
hold-time seconds;
}
level (1 | 2) {
disable;
hello-authentication-key key;
hello-authentication-type authentication;
hello-interval seconds;
hold-time seconds;
ipv4-multicast-metric number;
ipv6-multicast-metric number;
ipv6-unicast-metric number;
metric metric;
passive;
priority number;
te-metric metric;
}
link-protection;
lsp-interval milliseconds;
mesh-group (value | blocked);

Copyright 2015, Juniper Networks, Inc.

315

IS-IS Feature Guide for Routing Devices

no-adjacency-down-notification;
no-eligible-backup;
no-ipv4-multicast;
no-ipv6-multicast;
no-ipv6-unicast;
no-unicast-topology;
node-link-protection;
passive;
point-to-point;
}
}
}

Related
Documentation

316

Notational Conventions Used in Junos OS Configuration Hierarchies

[edit protocols] Hierarchy Level

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

admin-group
Syntax

Hierarchy Level

Release Information
Description

admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
[edit logical-systems logical-system-name routing-options backup-selection destination
prefix interface interface name],
[edit logical-systems logical-system-name routing-instances instance-name routing-options
backup-selection destination prefix interface interface-name],
[edit routing-instances instance-name routing-options backup-selection destination prefix
interface interface-name],
[edit routing-options backup-selection destination prefix interface interface name]

Statement introduced in Junos OS Release 14.1.


Define the administrative groups criteria for the selection of the backup path.

NOTE: Configure group names of admin-group under the [edit protocols


mpls] hierarchy level.

Options

exclude [ group-name ] Specify the administrative groups to be excluded. The backup

path is not selected as the loop-free alternate (LFA) or backup next hop if any of
the links in the path have any one of the listed administrative groups.
group-name Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
include-all [ group-name ] Require each link in the backup path to have all the listed

administrative groups in order to accept the path.


group-name Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
include-any [ group-name ] Require each link in the backup path to have at least one

of the listed administrative groups in order to select the path.


group-name Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.
preference [ group-name ] Define an ordered set of administrative groups that specifies

the preference of the backup path. The leftmost element in the set is given the highest
preference.
group-name Name of one or more admin-group defined under the [edit protocols
mpls] hierarchy level.

Copyright 2015, Juniper Networks, Inc.

317

IS-IS Feature Guide for Routing Devices

Required Privilege
Level
Related
Documentation

318

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

Understanding Backup Selection Policy for OSPF Protocol

backup-selection (Protocols ISIS) on page 322

destination on page 331

interface on page 350

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

authentication-key (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

authentication-key key;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Authentication key (password). Neighboring routing devices use the password to verify
the authenticity of packets sent from this interface. For the key to work, you also must
include the authentication-type statement.
All routing devices must use the same password. If you are using the Junos OS IS-IS
software with another implementation of IS-IS, the other implementation must be
configured to use the same password for the domain, the area, and all interfaces adjacent
to the Juniper Networks routing device.

Default

If you do not include this statement and the authentication-type statement, IS-IS
authentication is disabled.

Options

keyAuthentication password. The password can be up to 1024 characters long.

Characters can include any ASCII strings. If you include spaces, enclose all characters
in quotation marks ( ).

CAUTION: A simple password for authentication is truncated if it exceeds


254 characters.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Copyright 2015, Juniper Networks, Inc.

319

IS-IS Feature Guide for Routing Devices

authentication-key-chain (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description
Options

authentication-key-chain key-chain-name;
[edit logical-systems name protocols isis level level-number],
[edit logical-systems name routing-instances instance-name protocols isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances instance-name protocols isis level level-number]

Statement introduced in Junos OS Release 11.2.


Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Apply and enable an authentication keychain to the routing device.
key-chainAuthentication keychain name. It can be up to 126 characters. Characters can

include any ASCII strings. If you include spaces, enclose all characters in quotation
marks ( ).
Required Privilege
Level
Related
Documentation

320

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Example: Configuring Route Authentication for BGP

Example: Configuring BFD Authentication for Securing Static Routes

Configuring the Authentication Key Update Mechanism for BGP and LDP Routing Protocols

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

authentication-type (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

Default

Options

authentication-type authentication;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable authentication and specify the authentication scheme for IS-IS. If you enable
authentication, you must specify a password by including the authentication-key
statement.
If you do not include this statement and the authentication-key statement, IS-IS
authentication is disabled.
authenticationAuthentication scheme:

md5Use HMAC authentication in combination with MD5. HMAC-MD5 authentication

is defined in RFC 2104, HMAC: Keyed-Hashing for Message Authentication.

simpleUse a simple password for authentication. The password is included in the

transmitted packet, making this method of authentication relatively insecure. We


recommend that you not use this authentication method.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

authentication-key on page 319

no-authentication-check on page 378

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Copyright 2015, Juniper Networks, Inc.

321

IS-IS Feature Guide for Routing Devices

backup-selection (Protocols ISIS)


Syntax

backup-selection {
destination prefix {
interface (interface-name| all){
admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
bandwidth-greater-equal-primary;
dest-metric (highest | lowest);
downstream-paths-only;
metric-order [ root dest ];
node {
exclude [ node-address ];
preference [ node-address ];
}
node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
protection-type (link | node | node-link);
root-metric (highest | lowest);
srlg (loose | strict);
evaluation-order [ admin-group srlg bandwidth protection-type node node-tag metric
];
}
}
}

Hierarchy Level

[edit logical-systems logical-system-name routing-options],


[edit logical-systems logical-system-name routing-instances instance-name routing-options],
[edit routing-instances instance-name routing-options],
[edit routing-options]

Release Information
Description

Statement introduced in Junos OS Release 14.1.


Define backup selection policies, per prefix per primary next-hop interface, to enforce
loop-free alternate (LFA) selection based on admin-group, srlg, bandwidth,
protection-type, node, node-tag, and metric attributes of the backup path.
The remaining statements are explained separately.

Required Privilege
Level
Related
Documentation

322

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

backup-spf-options (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

backup-spf options {
node-link-degradation;
per-prefix-calculation;
remote-backup-calculation;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 11.4R3.


node-link-degradation option added in Junos OS Release 14.2.
Configure options for running the shortest-path-first (SPF) algorithm for backup next
hops for protected interfaces. Use these options to override the default behavior of having
Junos OS calculate backup paths for all the topologies in an instance when at least one
interface is configured with link protection or node-link protection.
This configuration option is used in conjunction with the node-link-protection statement
to compute per-prefix loop-free alternate routes (LFAs).

Options

node-link-degradationDegrade an interface from node-link to link protection in case

no node protection LFA route is found for a given destination node.


per-prefix-calculationCalculate backup next hops for non-best prefix originators.

The remaining statement is explained separately.


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-control-levelTo add this statement to the configuration.

Example: Configuring MPLS Egress Protection for Layer 3 VPN Services

Example: Configuring Layer 3 VPN Egress Protection with RSVP and LDP

link-protection

node-link-protection

remote-backup-calculation on page 401

Copyright 2015, Juniper Networks, Inc.

323

IS-IS Feature Guide for Routing Devices

bfd-liveness-detection (Protocols IS-IS)


Syntax

bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}

Hierarchy Level

[edit logical-systems logical-system-name protocols isis interface interface-name],


[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Release Information

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
detection-time threshold and transmit-interval threshold options added in Junos OS
Release 8.2.
Support for logical systems introduced in Junos OS Release 8.3.
no-adaptation statement introduced in Junos OS Release 9.0.
authentication algorithm, authentication key-chain, and authentication loose-check options
introduced in Junos OS Release 9.6.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.

Description
Options

Configure bidirectional failure detection timers and authentication.


authentication algorithm algorithm-name Configure the algorithm used to authenticate

the specified BFD session: simple-password, keyed-md5, keyed-sha-1,


meticulous-keyed-md5, meticulous-keyed-sha-1.
authentication key-chain key-chain-nameAssociate a security key with the specified

BFD session using the name of the security keychain. The name you specify must
match one of the keychains configured in the authentication-key-chains key-chain
statement at the [edit security] hierarchy level.

324

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

authentication loose-check(Optional) Configure loose authentication checking on the

BFD session. Use only for transitional periods when authentication might not be
configured at both ends of the BFD session.
detection-time threshold millisecondsConfigure a threshold for the adaptation of the

BFD session detection time. When the detection time adapts to a value equal to or
greater than the threshold, a single trap and a single system log message are sent.
minimum-interval millisecondsConfigure the minimum interval after which the local

routing device transmits a hello packet and then expects to receive a reply from the
neighbor with which it has established a BFD session. Optionally, instead of using
this statement, you can specify the minimum transmit and receive intervals separately
using the transmit-interval minimum-interval and minimum-receive-interval
statements.
Range: 1 through 255,000
minimum-receive-interval millisecondsConfigure the minimum interval after which the

local routing device expects to receive a reply from a neighbor with which it has
established a BFD session. Optionally, instead of using this statement, you can
configure the minimum receive interval using the minimum-interval statement.
Range: 1 through 255,000
multiplier numberConfigure the number of hello packets not received by a neighbor

that causes the originating interface to be declared down.


Range: 1 through 255
Default: 3
no-adaptationSpecify that BFD sessions not adapt to changing network conditions.

We recommend that you not disable BFD adaptation unless it is preferable not to
have BFD adaptation enabled in your network.
transmit-interval threshold millisecondsConfigure the threshold for the adaptation of

the BFD session transmit interval. When the transmit interval adapts to a value
greater than the threshold, a single trap and a single system message are sent. The
interval threshold must be greater than the minimum transmit interval.
32

Range: 0 through 4,294,967,295 (2

1)

transmit-interval minimum-interval millisecondsConfigure a minimum interval after

which the local routing device transmits hello packets to a neighbor. Optionally,
instead of using this statement, you can configure the minimum transmit interval
using the minimum-interval statement.
Range: 1 through 255,000
versionConfigure the BFD version to detect: 1 (BFD version 1) or automatic (autodetect

the BFD version)


Default: automatic
Required Privilege
Level

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Copyright 2015, Juniper Networks, Inc.

325

IS-IS Feature Guide for Routing Devices

Related
Documentation

Example: Configuring BFD for IS-IS on page 111

Understanding BFD for IS-IS on page 109

Example: Configuring BFD Authentication for IS-IS on page 122

Configuring BFD Authentication for IS-IS on page 119

checksum (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

checksum;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable checksums for packets on this interface.
Junos OS supports IS-IS checksums as documented in RFC 3358, Optional Checksums
in Intermediate System to Intermediate System (ISIS).
The checksum cannot be enabled with MD5 hello authentication on the same interface.

Required Privilege
Level
Related
Documentation

326

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 39

Understanding Checksums on IS-IS Interfaces for Error Checking on page 38

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

clns-routing
Syntax
Hierarchy Level

Release Information

Description

Required Privilege
Level
Related
Documentation

clns-routing;
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 11.2 for MX Series routers.
Enable IS-IS to exchange Connectionless Network Service (CLNS) routes. CLNS is a
Layer 3 protocol, similar to IPv4. CLNS uses network service access points (NSAPs) to
address end systems and intermediate systems.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS for CLNS on page 241

Example: Configuring Static Routes for CLNS

Example: Configuring BGP for CLNS VPNs

Understanding BGP for CLNS VPNs

Understanding Static Routes for CLNS

Copyright 2015, Juniper Networks, Inc.

327

IS-IS Feature Guide for Routing Devices

clns-updown-compatibility
Syntax
Hierarchy Level

Release Information
Description

clns-updown-compatibility;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 11.4R7.


When you enable IS-IS to exchange Connectionless Network Service (CLNS) routes,
Junos OS sets the reserved (R) bit in the default metric field inside type, length, and value
(TLV) type-3 (ES-Neighbor) as a marker for routing loop prevention. Junos OS uses the
up/down bit for marking prefixes on the Level 2-to-Level 1 boundary as being propagated
Down, such that any router in that area never propagates it Up on a Level 1-to-Level 2
boundary. For detailed information about how this works in IP routing environments, see
RFC 2966, Domain-wide Prefix Distribution with Two-Level IS-IS.
Some other vendors platforms might not support up/down bit setting in CLNS route
TLVs. If one of these vendors platforms receives this TLV with the R bit set, the platform
discards the information.
When you use the clns-updown-compatibility statement in the IS-IS configuration, the
R bit is set to 0, and the issue is resolved. The clns-updown-compatibility statement
causes Junos OS to use the Internal/External metric-type bit in the TLV header instead
of using the R bit as the up/down bit marker. This has the advantage that older end
system (ES) equipment does not receive TLV headers with the R bit set.

CAUTION: Not using the R bit can lead to potential routing loops. You can
use the site-of-origin (SoO) extended community to prevent a looped BGP
update from being injected back to IS-IS when received from a remote provider
edge (PE) device. The receiving PE device can check against the SoO
community, and if the value matches its own, the NLRI is not accepted.

Required Privilege
Level
Related
Documentation

328

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS for CLNS on page 241

Example: Configuring Static Routes for CLNS

Example: Configuring BGP for CLNS VPNs

Understanding BGP for CLNS VPNs

Understanding Static Routes for CLNS

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

context-identifier (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information
Description
Options

context-identifier identifier;
[edit logical-systems logical-system-name protocols isis],
[edit protocols isis]

Statement introduced in Junos OS Release 10.4.


Configure IS-IS context identifier information.
identifierIPv4 address that defines a protection pair. The context identifier is manually

configured on both primary and protector PEs.


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

show isis context-identifier on page 473

Copyright 2015, Juniper Networks, Inc.

329

IS-IS Feature Guide for Routing Devices

csnp-interval
Syntax
Hierarchy Level

Release Information

Description

csnp-interval (seconds | disable);


[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the interval between complete sequence number PDUs (CSNPs) on a LAN
interface.
If the routing device is the designated router on a LAN, IS-IS sends CSN packets every
10 seconds. If the routing device is on a point-to-point interface, it sends CSN packets
every 5 seconds multiplied by the number of IS-IS adjacencies over point-to-point links,
which are in UP state.
To configure the interface not to send any CSNPs, specify the disable option.

Default

Options

By default, IS-IS sends CSNPs periodically. If the routing device is the designated router
on a LAN, IS-IS sends CSNPs every 10 seconds. If the routing device is on a point-to-point
interface, it sends CSNPs every 5 seconds multiplied by the number of IS-IS adjacencies
over point-to-point links, which are in UP state.
disableDo not send CSNPs on this interface.
secondsNumber of seconds between the sending of CSNPs.

Range: 1 through 65,535 seconds


Default: 10 seconds on LAN broadcast links. 5 seconds on point-to-point links.
Required Privilege
Level
Related
Documentation

330

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring the Transmission Frequency for CSNP Packets on IS-IS Interfaces
on page 229

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

destination
Syntax

destination prefix {
interface (interface-name |all) {
admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
bandwidth-greater-equal-primary;
dest-metric (highest | lowest);
downstream-paths-only ;
evaluation-order [ admin-group srlg bandwidth protection-type neighbor neighbor-tag
metric ];
metric-order [ root dest ];
node {
exclude [ neighbor-address ];
preference [ neighbor-address ];
}
node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
protection-type (link |node | node-link);
root-metric (highest | lowest) ;
srlg (loose |strict);
}
}

Hierarchy Level

[edit logical-systems logical-system-name routing-options backup-selection],


[edit logical-systems logical-system-name routing-instances instance-name routing-options
backup-selection],
[edit routing-instances instance-name routing-options backup-selection],
[edit routing-options backup-selection]

Release Information
Description
Options

Statement introduced in Junos OS Release 14.1.


Define the backup selection policy for a particular destination prefix or for all the prefixes.
prefix Destination prefix name and prefix length. You can specify 0/0 for the IPv4

least-specific prefix or 0::0/0 for the IPv6 least-specific prefix.


The remaining statements are explained separately.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

backup-selection (Protocols ISIS) on page 322

Copyright 2015, Juniper Networks, Inc.

331

IS-IS Feature Guide for Routing Devices

disable (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

disable;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name protocols isis traffic-engineering],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name
protocols isis interface interface-name level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis traffic-engineering],
[edit protocols isis],
[edit protocols isis interface interface-name],
[edit protocols isis interface interface-name level level-number],
[edit protocols isis traffic-engineering],
[edit routing-instances routing-instance-name protocols isis],
[edit routing-instances routing-instance-name protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number],
[edit routing-instances routing-instance-name protocols isis traffic-engineering]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Disable IS-IS on the routing device, on an interface, or on a level.
At the [edit protocols isis traffic-engineering] hierarchy level, disable IS-IS support for
traffic engineering.
Enabling IS-IS on an interface (by including the interface statement at the [edit protocols
isis] or the [edit routing-instances routing-instance-name protocols isis] hierarchy level),
disabling it (by including the disable statement), and not actually having IS-IS run on an
interface (by including the passive statement) are mutually exclusive states.

Default

IS-IS is enabled for Level 1 and Level 2 routers on all interfaces on which family iso is
enabled.
IS-IS support for traffic engineering is enabled.

Required Privilege
Level
Related
Documentation

332

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

IS-IS Overview on page 3

disable (LDP Synchronization for IS-IS)


Syntax
Hierarchy Level

Release Information
Description
Required Privilege
Level
Related
Documentation

disable;
[edit logical-systems logical-system-name protocols isis interface interface-name
ldp-synchronization],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name ldp-synchronization],
[edit protocols isis interface interface-name ldp-synchronization],
[edit routing-instances routing-instance-name protocols isis interface interface-name
ldp-synchronization]

Statement introduced in Junos OS Release 7.5.


Disable LDP synchronization for IS-IS.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding LDP-IGP Synchronization on page 215

Example: Configuring Synchronization Between IS-IS and LDP on page 217

Copyright 2015, Juniper Networks, Inc.

333

IS-IS Feature Guide for Routing Devices

export (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

export [ policy-names ];
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Apply one or more policies to routes being exported from the routing table into IS-IS.
All routing protocols store the routes that they learn in the routing table. The routing table
uses this collected route information to determine the active routes to destinations. The
routing table then installs the active routes into its forwarding table and exports them
into the routing protocols. It is these exported routes that the protocols advertise.
For each protocol, you control which routes the protocol stores in the routing table and
which routes the routing table exports into the protocol from the routing table by defining
a routing policy for that protocol.

NOTE: For IS-IS, you cannot apply routing policies that affect how routes are
imported into the routing table; doing so with a link-state protocol can easily
lead to an inconsistent topology database.

Options
Required Privilege
Level
Related
Documentation

334

policy-namesName of one or more policies.

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Redistributing OSPF Routes into IS-IS

Example: Configuring an IS-IS Default Route Policy on Logical Systems on page 257

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

external-preference (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description
Options

external-preference preference;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the preference of external routes.
preferencePreference value.
32

Range: 0 through 4,294,967,295 (2

1)

Default: 15 (for Level 1 internal routes), 18 (for Level 2 internal routes), 160 (for Level 1
external routes), 165 (for Level 2 external routes)
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Route Preferences Overview

Example: Redistributing OSPF Routes into IS-IS on page 83

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS on page 98

Understanding BGP Communities and Extended Communities as Routing Policy Match


Conditions on page 97

Understanding Routing Policies on page 43

preference on page 394

Copyright 2015, Juniper Networks, Inc.

335

IS-IS Feature Guide for Routing Devices

family (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

Options

family inet {
shortcuts {
multicast-rpf-routes;
}
}
family inet6 {
shortcuts;
}
[edit logical-systems logical-system-name protocols isis traffic-engineering],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis traffic-engineering],
[edit protocols isis traffic-engineering],
[edit routing-instances routing-instance-name protocols isis traffic-engineering]

Statement introduced in Junos OS Release 9.3.


Support for IPv6 for IGP shortcuts introduced in Junos OS Release 9.3.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the address family for traffic engineering IS-IS interior gateway protocol (IGP)
shortcuts.
inetIPv4 address family
inet6IPv6 address family
The remaining statements are explained separately.

Required Privilege
Level

336

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

graceful-restart (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

graceful-restart {
disable;
helper-disable;
restart-duration seconds;
}
[edit logical-systems logical-system-name protocols isis],
[edit protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Configure graceful restart parameters for IS-IS.
Graceful restart allows a routing device to restart with minimal effects to the network,
and is enabled for all routing protocols at the [edit routing-options] hierarchy level. When
graceful restart is enabled, the restarting routing device is not removed from the network
topology during the restart period. The adjacencies are reestablished after restart is
complete.
On LAN interfaces where IS-IS is configured on a transit router that serves as the
designated router (DR), a graceful restart causes:

Options

The ingress router of the label-switched path (LSP), which passes through the DR, to
break the LSP.

The ingress router to re-signal the LSP.

disableDisable graceful restart for IS-IS.


helper-disableDisable graceful restart helper capability. Helper mode is enabled by

default.
restart-duration secondsTime period for the restart to last, in seconds.

Range: 30 through 300 seconds


Default: 30 seconds
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Configuring Routing Protocols Graceful Restart

Copyright 2015, Juniper Networks, Inc.

337

IS-IS Feature Guide for Routing Devices

hello-authentication-key
Syntax
Hierarchy Level

Release Information

Description

Default

Options

hello-authentication-key password;
[edit logical-systems logical-system-name protocols isis interface interface-name level
number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level number],
[edit protocols isis interface interface-name level number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure an authentication key (password) for hello packets. Neighboring routing devices
use the password to verify the authenticity of packets sent from an interface. For the key
to work, you also must include the hello-authentication-type statement.
By default, hello authentication is not configured on an interface. However, if IS-IS
authentication is configured, the hello packets are authenticated using the IS-IS
authentication type and password.
passwordAuthentication password. The password can be up to 255 characters.

Characters can include any ASCII strings. If you include spaces, enclose all characters
in quotation marks ( ).
Required Privilege
Level
Related
Documentation

338

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

authentication-key on page 319

authentication-type on page 321

hello-authentication-type on page 340

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

hello-authentication-key-chain
Syntax
Hierarchy Level

Release Information

Description
Options

hello-authentication-key-chain key-chain-name;
[edit logical-systems name protocols isis interface interface-name level level-number],
[edit logical-systems name routing-instances instance-name protocols isis interface
interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances instance-name protocols isis interface interface-name level
level-number]

Statement introduced in Junos OS Release 11.2.


Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Apply an authentication keychain to the IS-IS interface.
key-chain-nameAuthentication keychain name. It can be up to 126 characters. Characters

can include any ASCII strings. If you include spaces, enclose all characters in quotation
marks ( ).
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Copyright 2015, Juniper Networks, Inc.

339

IS-IS Feature Guide for Routing Devices

hello-authentication-type
Syntax
Hierarchy Level

Release Information

Description

hello-authentication-type (md5 | simple);


[edit logical-systems logical-system-name protocols isis interface interface-name level
number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level number],
[edit protocols isis interface interface-name level number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable authentication on an interface for hello packets. If you enable authentication on
hello packets, you must specify a password by including the hello-authentication-key
statement.
You can configure authentication for a given IS-IS level on an interface. On a point-to-point
link, if you enable hello authentication for both IS-IS levels, the password configured for
Level 1 is used for both levels.

CAUTION: If no authentication is configured for Level 1 on a point-to-point


link with both levels enabled, the hello packets are sent without any password,
regardless of the Level 2 authentication configurations.

Default

Options

By default, hello authentication is not configured on an interface. However, if IS-IS


authentication is configured, the hello packets are authenticated using the IS-IS
authentication type and password.
md5Specifies Message Digest 5 as the packet verification type.
simpleSpecifies simple authentication as the packet verification type.

Required Privilege
Level
Related
Documentation

340

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

authentication-key on page 319

authentication-type on page 321

hello-authentication-key on page 338

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

hello-interval (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

hello-interval seconds;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Modify the frequency with which the routing device sends hello packets out of an interface,
in seconds.
Routing devices send hello packets at a fixed interval on all interfaces to establish and
maintain neighbor relationships. This interval is advertised in the hello interval field in the
hello packet.
You can send out hello packets in subsecond intervals. To send out hello packets every
333 milliseconds, set the hold-time value to 1.

Options

secondsFrequency of transmission for hello packets.

Range: 1 through 20,000 seconds


Default: 3 seconds (for designated intermediate system [DIS] routers), 9 seconds (for
non-DIS routers)
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

hold-time on page 345

Copyright 2015, Juniper Networks, Inc.

341

IS-IS Feature Guide for Routing Devices

hello-padding
Syntax
Hierarchy Level

Release Information

Description

hello-padding (adaptive | disable | loose | strict);


[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced in Junos OS Release 8.0.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure padding on hello packets to accommodate asymmetrical maximum transfer
units (MTUs) from different hosts.
This helps to prevent a premature adjacency Up state when one routing devices MTU
does not meet the requirements to establish the adjacency.
As an OSI Layer 2 protocol, IS-IS does not support data fragmentation. Therefore,
maximum packet sizes must be established and supported between two routers. During
adjacency establishment, the IS-IS protocol makes sure that the link supports a packet
size of 1492 bytes by padding outgoing hello packets up to the maximum packet size of
1492 bytes.
This is the default behavior of the Junos OS IS-IS implementation. However, Junos OS
provides an option to disable hello padding that can override this behavior.
There are four types of hello padding:

342

Adaptive paddingOn point-to-point connections, the hello packets are padded from
the initial detection of a new neighbor until the neighbor verifies the adjacency as Up
in the adjacency state type, length, and value (TLV) tuple. If the neighbor does not
support the adjacency state TLV, then padding continues. On LAN connections, padding
starts from the initial detection of a new neighbor until there is at least one active
adjacency on the interface. Adaptive padding has more overhead than loose padding
and is able to detect MTU asymmetry from one side of the connection. This one-sided
detection can result in generation of extra link-state PDUs that are flooded throughout
the network. Specify the adaptive option to configure enough padding to establish an
adjacency to neighbors.

Disabled paddingPadding is disabled on all types of interfaces for all adjacency


states. Specify the disable option to accommodate interfaces that support less than
the default packet size of 1492 bytes.

Loose padding (the default)The hello packet is padded from the initial detection of
a new neighbor until the adjacency transitions to the Up state. Loose padding might
not be able to detect certain situations such as asymmetrical MTUs between the
routing devices. Specify the loose option to configure enough padding to initialize an
adjacency to neighbors.

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

Options

Strict paddingPadding is done on all interface types and for all adjacency states, and
is continuous. Strict padding has the most overhead. The advantage is that strict
padding detects MTU issues on both sides of a link. Specify the strict option to configure
padding to allow all adjacency states with neighbors.

adaptiveConfigure padding until the neighbor adjacency is established and active.


disableDisable padding on all types of interfaces for all adjacency states.
looseConfigure padding until the state of the adjacency is initialized.
strictConfigure padding for all adjacency states.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Copyright 2015, Juniper Networks, Inc.

343

IS-IS Feature Guide for Routing Devices

hold-time (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

hold-time seconds;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Set the length of time a neighbor considers this router to be operative (up) after receiving
a hello packet. If the neighbor does not receive another hello packet within the specified
time, it marks this routing device as inoperative (down). The hold time itself is advertised
in the hello packets.
The hold time specifies how long a neighbor should consider this routing device to be
operative without receiving another hello packet. If the neighbor does not receive a hello
packet from this routing device within the hold time, it marks the routing device as being
unavailable.
For systems configured with graceful routing switchover (GRES) with Graceful Restart,
the hold time for Master and Backup Routing Engines should be set to a value higher
than 40 seconds. This ensures that adjacencies between the Routing Engine and the
neighboring peer 'helper' routers do not time out, stopping graceful restart, and all traffic.

Options

secondsHold-time value, in seconds.

Range: 3 through 65,535 seconds, or 1 to send out hello packets every 333 milliseconds
Default: 9 seconds (for designated intermediate system [DIS] routers), 27 seconds (for
non-DIS routers; three times the default hello interval)
Required Privilege
Level
Related
Documentation

344

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Configuring Graceful Routing Engine Switchover

Example: Configuring IS-IS

Example: Configuring IS-IS for GRES with Graceful Restart

hello-interval on page 341

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

hold-time (LDP Synchronization for IS-IS)


Syntax
Hierarchy Level

Release Information
Description

hold-time seconds;
[edit logical-systems logical-system-name protocols isis interface interface-name
ldp-synchronization],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name ldp-synchronization],
[edit protocols isis interface interface-name ldp-synchronization],
[edit routing-instances routing-instance-name protocols isis interface interface-name
ldp-synchronization]

Statement introduced in Junos OS Release 7.5.


Configure the time period to advertise the maximum cost metric for a link that is not fully
operational.

NOTE: When an interface has been in the holddown state for more than
3 minutes, a system log message with a warning level is sent. This message
appears in both the messages file and the trace file.

Options

secondsHold-time value, in seconds.

Range: 1 through 65,535 seconds


Default: Infinity
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Synchronization Between IS-IS and LDP on page 217

Understanding LDP-IGP Synchronization on page 215

Copyright 2015, Juniper Networks, Inc.

345

IS-IS Feature Guide for Routing Devices

ignore-attached-bit
Syntax
Hierarchy Level

Release Information

Description

ignore-attached-bit;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Ignore the attached bit on IS-IS Level 1 routers. Configuring this statement enables the
routing device to ignore the attached bit on incoming Level 1 link-state PDUs. If the
attached bit is ignored, no default route, which points to the routing device which has set
the attached bit, is installed.
There might be times, such as during a denial-of-service (DoS) attack, that you do not
want a Level 1 router to be able to forward traffic based on a default route.
To prevent a routing device from being able to reach interarea destinations, you can
prevent the routing device from installing the default route without affecting the status
of its IS-IS adjacencies. The ignore-attached-bit statement is used to tell the routing
device to ignore the presence of the attached bit in Level 1 link-state PDUs, which blocks
the installation of the IS-IS default route.

Default
Required Privilege
Level

346

The ignore-attached-bit statement is disabled by default.


routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

ignore-lsp-metrics (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information
Description

ignore-lsp-metrics;
[edit logical-systems logical-system-name protocols isis traffic-engineering],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis traffic-engineering],
[edit protocols isis traffic-engineering],
[edit routing-instances routing-instance-name protocols isis traffic-engineering]

Statement introduced in Junos OS Release 8.0.


Ignore the metrics for RSVP label-switched paths (LSPs) in IS-IS traffic engineering
shortcut calculations or when you configure LDP over RSVP LSPs.
If you are using RSVP for traffic engineering, you can run LDP simultaneously to eliminate
the distribution of external routes in the core. The LSPs established by LDP are tunneled
through the LSPs established by RSVP. LDP effectively treats the traffic-engineered LSPs
as single hops. Ignoring the metric of RSVP LSPs avoids mutual dependency between
IS-IS and RSVP, eliminating the time period when the RSVP metric used for tunneling
traffic is not up to date.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling IS-IS Traffic Engineering Support on page 191

Example: Advertising Label-Switched Paths into IS-IS on page 205

Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 213

Example: Configuring Synchronization Between IS-IS and LDP on page 217

shortcuts on page 404

Copyright 2015, Juniper Networks, Inc.

347

IS-IS Feature Guide for Routing Devices

interface (Protocols IS-IS)


Syntax

348

interface (all | interface-name) {


disable;
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
multiplier number;
}
checksum;
csnp-interval (seconds | disable);
hello-padding (adaptive | loose | strict);
ldp-synchronization {
disable;
hold-time seconds;
}
lsp-interval milliseconds;
mesh-group (value | blocked);
no-adjacency-holddown;
no-eligible-remote-backup;
no-ipv4-multicast;
no-ipv6-multicast;
no-ipv6-unicast;
no-unicast-topology;
passive;
point-to-point;
level level-number {
disable;
hello-authentication-key key;
hello-authentication-key-chain key-chain-name;
hello-authentication-type authentication;
hello-interval seconds;
hold-time seconds;
ipv4-multicast-metric metric;
ipv6-multicast-metric metric;
ipv6-unicast-metric metric;
metric metric;
passive;
priority number;
te-metric metric;
}
}

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

Hierarchy Level

[edit logical-systems logical-system-name protocols isis],


[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Release Information

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
no-eligible-remote-backup option introduced in Junos OS Release 14.2 for the MX Series.

Description

Configure interface-specific IS-IS properties. To configure more than one interface, include
the interface statement multiple times.
Enabling IS-IS on an interface (by including the interface statement at the [edit protocols
isis] or the [edit routing-instances routing-instance-name protocols isis] hierarchy level),
disabling it (by including the disable statement), and not actually having IS-IS run on an
interface (by including the passive statement) are mutually exclusive states.

Options

allHave Junos OS create IS-IS interfaces automatically. If you include this option, disable

IS-IS on the management interface (fxp0).


interface-nameName of an interface. Specify the full interface name, including the

physical and logical address components.


The remaining statements are explained separately.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

349

IS-IS Feature Guide for Routing Devices

interface (Protocols ISIS)


Syntax

Hierarchy Level

Release Information
Description
Options

interface (interface-name | all) {


admin-group {
exclude [ group-name ];
include-all [ group-name ];
include-any [ group-name ];
preference [ group-name ];
}
bandwidth-greater-equal-primary;
dest-metric (highest | lowest);
downstream-paths-only ;
evaluation-order [ admin-group srlg bandwidth protection-type neighbor neighbor-tag
metric ];
metric-order [ root dest ];
node {
exclude [ neighbor-address ];
preference [ neighbor-address ];
}
node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
protection-type (link | node| node-link);
root-metric (highest | lowest);
srlg (loose |strict);
}
[edit logical-systems logical-system-name routing-options backup-selection destination
prefix],
[edit logical-systems logical-system-name routing-instances instance-name routing-options
backup-selection destination prefix],
[edit routing-instances instance-name routing-options backup-selection prefix],
[edit routing-options backup-selection destination prefix]

Statement introduced in Junos OS Release 14.1.


Define the backup selection policy for a specific primary next hop.
interface-name Name of the primary next-hop interface.
all All the interfaces.
bandwidth-greater-equal-primary Allow the selection of the backup next hop only if

the bandwidth is greater than or equal to the bandwidth of the primary next hop.
dest-metric (highest | lowest)Specifiy the metric from the one-hop neighbor or from

the remote router such as an RSVP backup label-switched-path (LSP) tail-end


router to the final destination.
highest Select the backup path that has the highest destination metric.
lowest Select the backup path that has the lowest destination metric.

350

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

downstream-paths-only Select the backup path that is a downstream path to the

destination.
evaluation-order [ admin-group srlg bandwidth protection-type neighbor neighbor-tag
metric ]Control the order and the criteria of evaluating the backup path. The default

order of evaluation is admin-group, srlg, bandwidth, protection-type, neighbor,


neighbor-tag, and metric.

NOTE: For the explicitly configured evaluation order, only the listed
attributes influence the selection of the backup path.

Copyright 2015, Juniper Networks, Inc.

351

IS-IS Feature Guide for Routing Devices

metric-order [ root dest ] Specify the order of preference of the root and the destination

metric during the backup path selection. The preference order can be:

[root dest] Backup path selection or preference is first based on the root-metric
criteria. If the criteria of all the root-metric is the same, then the selection or
preference is based on the dest-metric.

[dest root] Backup path selection or preference is first based on the dest-metric
criteria. If the criteria of all the dest-metric is the same, then the selection is based
on the root-metric.

NOTE: By default, backup paths with lower destination metric criteria


are selected or preferred. If the criteria is the same, then the lowest root
metric criteria is preferred or selected.

root The metric to a one-hop neighbor or a remote router.


dest The metric from a one-hop neighbor or remote router to the final destination.
protection-type (link | node | node-link)Specify the required protection type of the

backup path.

NOTE: If no protection-type is configured, then by default the first best


path that matches all the other criteria is executed.

link Select the backup path that provides link protection.


node Select the backup path that provides node protection.
node-link Allow either node or link protection LFA where node-protection LFA is

preferred over link-protection LFA.


root-metric (highest | lowest)Specify the metric to the one-hop neighbor or to the

remote router such as an RSVP backup label-switched-path (LSP) tail-end router.


highest Select the highest root metric.
lowest Select the lowest root metric.
srlg (loose | strict)Define the backup selection to either allow or reject the common

shared risk link groups (SRLGs) between the primary link and any link in the backup
path.
loose Allow the backup path that has common srlgs between the primary link and

any link in the backup path. A backup path with a fewer number of srlg collisions
is preferred.
strict Reject the backup path that has common srlgs between the primary link and

each link in the backup path.

352

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

The remaining statements are explained separately.


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

backup-selection (Protocols ISIS) on page 322

destination on page 331

ipv4-multicast
Syntax
Hierarchy Level

Release Information

Description

ipv4-multicast;
[edit logical-systems logical-system-name protocols isis topologies],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis topologies],
[edit protocols isis topologies],
[edit routing-instances routing-instance-name protocols isis topologies]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure alternate IPv4 multicast topologies.

NOTE: The IS-IS interface metrics for the IPv4 topology can be configured
independently of the IPv6 metrics. You can also selectively disable interfaces
from participating in the IPv6 topology while continuing to participate in the
IPv4 topology. This lets you exercise control over the paths that unicast data
takes through a network.

Default
Required Privilege
Level
Related
Documentation

Multicast topologies are disabled.


routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

353

IS-IS Feature Guide for Routing Devices

ipv4-multicast-metric
Syntax
Hierarchy Level

Release Information

Description
Options

ipv4-multicast-metric metric;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Specify the multicast topology metric value for the level.
metricMetric value.

Range: 0 through 16,777,215


Required Privilege
Level
Related
Documentation

354

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

ipv6-multicast
Syntax
Hierarchy Level

Release Information

Description
Default
Required Privilege
Level
Related
Documentation

ipv6-multicast;
[edit logical-systems logical-system-name protocols isis topologies],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis topologies],
[edit protocols isis topologies],
[edit routing-instances routing-instance-name protocols isis topologies]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Configure alternate IPv6 multicast topologies.
Multicast topologies are disabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

ipv6-multicast-metric
Syntax
Hierarchy Level

Release Information

Description
Options

ipv6-multicast-metric metric;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Specify the IPv6 alternate multicast topology metric value for the level.
metricMetric value.

Range: 0 through 16,777,215


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

355

IS-IS Feature Guide for Routing Devices

ipv6-unicast
Syntax
Hierarchy Level

Release Information

Description

ipv6-unicast;
[edit logical-systems logical-system-name protocols isis topologies],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis topologies],
[edit protocols isis topologies],
[edit routing-instances routing-instance-name protocols isis topologies]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Configure alternate IPv6 unicast topologies.
This statement causes IS-IS to calculate an alternate IPv6 unicast topology, in addition
to the normal IPv4 unicast topology, and add the corresponding routes to inet6.0.

NOTE: The IS-IS interface metrics for the IPv4 topology can be configured
independently of the IPv6 metrics. You can also selectively disable interfaces
from participating in the IPv6 topology while continuing to participate in the
IPv4 topology. This lets you exercise control over the paths that unicast data
takes through a network.

Default
Required Privilege
Level
Related
Documentation

356

IPv6 unicast topologies are disabled.


routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

ipv6-unicast-metric
Syntax
Hierarchy Level

Release Information

Description

Options

ipv6-unicast-metric metric;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Specify the IPv6 unicast topology metric value for the level. The IS-IS interface metrics
for the IPv4 topology can be configured independently of the IPv6 metrics.
metricMetric value.

Range: 0 through 16,777,215


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

357

IS-IS Feature Guide for Routing Devices

isis
Syntax
Hierarchy Level

Release Information

Description

isis { ... }
[edit logical-systems logical-system-name protocols],
[edit logical-systems logical-system-name routing-instances routing-instance-name
protocols],
[edit protocols],
[edit routing-instances routing-instance-name protocols]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable IS-IS routing on the routing device or for a routing instance.
The isis statement is the one statement you must include in the configuration to run IS-IS
on the routing device or in a routing instance.

Default
Required Privilege
Level
Related
Documentation

358

IS-IS is disabled on the routing device.


routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS on page 14

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

label-switched-path (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information
Description

label-switched-path name level level-number metric metric;


[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Advertise label-switched paths (LSPs) into IS-IS as point-to-point links. The LSP is
advertised in the appropriate IS-IS levels as a point-to-point link and contains a local
address and a remote address.
When you advertise LSPs into IS-IS as point-to-point links, the LSPs are used in SPF
calculations. The advertisement contains a local address (the from address of the LSP),
a remote address (the to address of the LSP), and a metric.
Before a single-hop LSP between a multiaccess link can be announced as up and used
in SPF calculations, you must configure an LSP in both directions between two
label-switched routers.

Options

nameIdentifies the LSP.


level-numberIS-IS level number.

Values: 1 or 2
metricMetric value.

Range: 1 through 63, or 1 through 16,777,215 (if you have configured wide metrics)
Default: 0 (for lo0), 10 (for all other interfaces)
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Advertising Label-Switched Paths into IS-IS on page 205

Understanding Forwarding Adjacencies on page 205

Copyright 2015, Juniper Networks, Inc.

359

IS-IS Feature Guide for Routing Devices

ldp-synchronization
Syntax

Hierarchy Level

Release Information
Description

ldp-synchronization {
disable;
hold-time seconds;
}
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced in Junos OS Release 7.5.


Enable synchronization by advertising the maximum cost metric until LDP is operational
on the link.
LDP distributes labels in non-traffic-engineered applications. Labels are distributed along
the best path determined by IS-IS. If the synchronization between LDP and IS-IS is lost,
the label-switched path (LSP) goes down. Therefore, IS-IS and LDP synchronization is
beneficial. When LDP synchronization is configured and when LDP is not fully operational
on a given link (a session is not established and labels are not exchanged), IS-IS advertises
the link with the maximum cost metric. The link is not preferred but remains in the network
topology.
LDP synchronization is supported only on point-to-point interfaces and LAN interfaces
configured as point-to-point interfaces under IS-IS. LDP synchronization is not supported
during graceful restart.
To advertise the maximum cost metric until LDP is operational for LDP synchronization,
include the ldp-synchronization statement.
The remaining statements are explained separately.

Required Privilege
Level
Related
Documentation

360

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Synchronization Between LDP and OSPF

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

level (Global IS-IS)


Syntax

Hierarchy Level

Release Information

Description

level level-number {
authentication-key key;
authentication-key-chain (Protocols IS-IS) key-chain-name;
authentication-type type;
disable;
external-preference preference;
no-csnp-authentication;
no-hello-authentication;
no-psnp-authentication;
preference preference;
wide-metrics-only;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the global-level properties.
You can administratively divide a single AS into smaller groups called areas. You configure
each routing device interface to be in an area. Any interface can be in any area. The area
address applies to the entire routing device. You cannot specify one interface to be in
one area and another interface in a different area. To route between areas, you must
have two adjacent Level 2 routers that communicate with each other.
Level 1 routers can only route within their IS-IS area. To send traffic outside their area,
Level 1 routers must send packets to the nearest intra-area Level 2 router. A routing device
can be a Level 1 router, a Level 2 router, or both. You specify the router level on a
per-interface basis, and a routing device becomes adjacent to other routing devices on
the same level on that link only.
You can configure one Level 1 routing process and one Level 2 routing process on each
interface, and you can configure the two levels differently.

Options

level-numberIS-IS level number.

Values: 1 or 2
The remaining statements are explained separately.
Required Privilege
Level

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Copyright 2015, Juniper Networks, Inc.

361

IS-IS Feature Guide for Routing Devices

Related
Documentation

362

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

level (IS-IS Interfaces)


Syntax

Hierarchy Level

Release Information

Description

Options

level level-number {
level (IS-IS Interfaces);
hello-authentication-key key;
hello-authentication-key-chain key-chain-name;
hello-authentication-type authentication;
hello-interval seconds;
hold-time seconds;
ipv4-multicast-metric number;
ipv6-unicast-metric number;
metric metric;
passive;
priority number;
te-metric metric;
}
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Configure the IS-IS level. You can configure one instance of Level 1 routing and one
instance of Level 2 routing on each interface, and you can configure the two levels
differently.
level-numberIS-IS level number.

Values: 1 or 2
Default: The routing device operates as both a Level 1 and Level 2 router.
The remaining statements are explained separately.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

363

IS-IS Feature Guide for Routing Devices

link-protection (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

Required Privilege
Level
Related
Documentation

link-protection;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced in Junos OS Release 9.5.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable link protection on the specified IS-IS interface. Junos OS creates a backup loop-free
alternate path to the primary next hop for all destination routes that traverse the protected
interface.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

node-link-protection on page 381

loose-authentication-check
Syntax
Hierarchy Level

Release Information

Description
Required Privilege
Level
Related
Documentation

364

loose-authentication-check;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Allow the use of MD5 authentication without requiring network-wide deployment.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding Hitless Authentication Key Rollover for IS-IS on page 33

Example: Configuring Hitless Authentication Key Rollover for IS-IS on page 34

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

lsp-equal-cost
Syntax
Hierarchy Level

Release Information
Description

lsp-equal-cost;
[edit logical-systems logical-system-name protocols isis traffic-engineering multipath],
[edit protocols isis traffic-engineering multipath]

Statement introduced in Junos OS Release 9.6.


Configure label-switched paths (LSPs) to be retained as equal cost paths for load
balancing when a better path metric is found during the IS-IS internal routing table
calculation.
When a route with an improved metric is added to the IS-IS internal routing table, IS-IS
flushes all next-hop information (including LSP next-hop information) for a route. This
is undesirable, because certain equal-cost multipath (ECMP) combinations can be lost
during route calculation. To override this default IS-IS behavior, include the lsp-equal-cost
statement for load balancing, so that the equal cost path information is retained in the
routing table.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Example: Enabling IS-IS Traffic Engineering Support on page 191

multipath on page 375

traffic-engineering on page 413

Copyright 2015, Juniper Networks, Inc.

365

IS-IS Feature Guide for Routing Devices

lsp-interval
Syntax
Hierarchy Level

Release Information

Description

lsp-interval milliseconds;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the link-state PDU interval time.
By default, the routing device sends one link-state PDU packet out an interface every
100 milliseconds. To disable the transmission of all link-state PDUs, set the interval to 0.
Link-state PDU throttling by use of the lsp-interval statement controls the flooding pace
to neighboring routing devices in order to not overload them.
Also, consider that control traffic (such as link-state PDUs and related packets) might
delay user traffic (information packets) because control traffic always has precedence
in terms of scheduling on the routing device interface cards. Unfortunately, the control
traffic transmission rate is not decreased on low-bandwidth interfaces, such as DS-0 or
fractional T1 and E1 interface. Line control traffic stays the same. On a low-bandwidth
circuit that is transmitting 30 full-MTU-sized packets, there is not much bandwidth left
over for other types of packets.

Default

Options

By default, the routing device sends one link-state PDU out an interface every
100 milliseconds.
millisecondsNumber of milliseconds between the sending of link-state PDUs. Specifying

a value of 0 blocks all link-state PDU transmission.


Range: 0 through 1000 milliseconds
Default: 100 milliseconds
Required Privilege
Level
Related
Documentation

366

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Understanding Link-State PDU Throttling for IS-IS Interfaces on page 223

Example: Configuring the Transmission Frequency for CSNPs on IS-IS Interfaces

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

lsp-lifetime
Syntax
Hierarchy Level

Release Information

Description

lsp-lifetime seconds;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Specify how long a link-state PDU originating from the routing device should persist in
the network. The routing device sends link-state PDUs often enough so that the link-state
PDU lifetime never expires.
Because link-state PDUs have a maximum lifetime, they need to be refreshed. Refreshing
means that a routing device needs to re-originate its link-state PDUs periodically. The
re-origination interval must be less than the link-state PDUs lifetime. For example, if the
link-state PDU is valid for 1200 seconds, the routing device needs to refresh the link-state
PDU in less than 1200 seconds to avoid removal of the link-state PDU from the link-state
database by other routing devices. The recommended maximum link-state PDU origination
interval is the lifetime minus 300 seconds. So, in a default environment this would be
900 seconds. In Junos OS, the refresh interval is derived from the lifetime and is equal
to the lifetime minus 317 seconds. You can change the lifetime to a higher value to reduce
the number of refreshes in the network. (You would rarely want to increase the number
of refreshes.) Often theses periodic link-state PDU refreshes are referred to as refresh
noise, and network administrators want to reduce this noise as much as possible.
The show isis overview command displays the link-state PDU lifetime.

Default

Options

By default, link-state PDUs are maintained in network databases for 1200 seconds
(20 minutes) before being considered invalid. This length of time, called the LSP lifetime,
normally is sufficient to guarantee that link-state PDUs never expire.
secondslink-state PDU lifetime, in seconds.

Range: 350 through 65,535 seconds


Default: 1200 seconds
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Understanding Link-State PDU Throttling for IS-IS Interfaces on page 223

Copyright 2015, Juniper Networks, Inc.

367

IS-IS Feature Guide for Routing Devices

Example: Configuring the Transmission Frequency for CSNPs on IS-IS Interfaces

http://www.juniper.net/us/en/training/certification/JNCIP_studyguide.pdf

max-areas
Syntax
Hierarchy Level

Release Information

Description

max-areas number;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis]
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 8.1.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Modify the maximum number of IS-IS areas advertised.
This value is included in the Maximum Address Area field of the IS-IS common PDU
header included in all outgoing PDUs.
The maximum number of areas you can advertise is restricted to 36 to ensure that the
IIH PDUs have enough space to include other type, length, and value (TLV) fields, such
as the Authentication and IPv4 and IPv6 Interface Address TLVs.

Options

numberMaximum number of areas to include in the IS-IS hello (IIH) PDUs and link-state

PDUs.
Range: 3 through 36
Default: 3
Required Privilege
Level
Related
Documentation

368

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Areas to Divide an Autonomous System into Smaller Groups on


page 19

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

max-hello-size
Syntax
Hierarchy Level

Release Information
Description

Options

max-hello-size size;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 12.1.


Modify the maximum size of IS-IS hello packets. IS-IS sends hello packets out of all IS-IS
enabled interfaces to discover neighbors and form adjacencies between the devices.
sizeMaximum size allocated for IS-IS hello packets.

Range: 512 through 1492 bytes


Default: 1492 bytes
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Copyright 2015, Juniper Networks, Inc.

369

IS-IS Feature Guide for Routing Devices

max-lsp-size
Syntax
Hierarchy Level

Release Information
Description

Options

max-lsp-size size;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 12.1.


Modify the maximum size of IS-IS link-state PDUs. IS-IS sends link-state PDUs out of
IS-IS enabled interfaces to distribute routing information between the IS-IS nodes.
sizeMaximum size allocated for IS-IS link-state PDUs.

Range: 512 through 1492 bytes


Default: 1492 bytes
Required Privilege
Level
Related
Documentation

370

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

max-snp-size
Syntax
Hierarchy Level

Release Information

max-snp-size size;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 12.1.

Description

Modify the maximum size of partial or complete IS-IS sequence number PDUs. IS-IS
sends sequence number packets out of IS-IS enabled interfaces to control the distribution
of link-state PDUs between the IS-IS nodes. Sequence number packets provide a
mechanism to synchronize the link-state databases of routers in the same area.

Options

sizeMaximum size allocated for sequence number of partial or complete IS-IS packets.

Range: 512 through 1400 bytes


Default: 1400 bytes
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Copyright 2015, Juniper Networks, Inc.

371

IS-IS Feature Guide for Routing Devices

mesh-group (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

mesh-group (blocked | value);


[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure an interface to be part of a mesh group, which is a set of fully connected nodes.
A mesh group is a set of routing devices that are fully connected. That is, they have a fully
meshed topology. When link-state PDUs are being flooded throughout an area, each
router within a mesh group receives only a single copy of a link-state PDU instead of
receiving one copy from each neighbor, thus minimizing the overhead associated with
the flooding of link-state PDUs.
To create a mesh group and designate that an interface be part of the group, assign a
mesh-group number to all the routing device interfaces in the group. To prevent an
interface in the mesh group from flooding link-state PDUs, configure blocking on that
interface.

Options

blockedConfigure the interface so that it does not flood link-state PDUs.


valueNumber that identifies the mesh group.
32

Range: 1 through 4,294,967,295 (2


Required Privilege
Level
Related
Documentation

372

1; 32 bits are allocated to identify a mesh group)

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Mesh Groups of IS-IS Interfaces on page 234

Understanding IS-IS Mesh Groups on page 233

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

metric (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

metric metric;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Specify the metric value for the level.
All IS-IS routes have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. The cost is an arbitrary, dimensionless integer that can be from 1 through 63,
24
or from 1 through 16,777,215 (2 1) if you are using wide metrics.
Similar to other routing protocols, IS-IS provides a way of exporting routes from the
routing table into the IS-IS network. When a route is exported into the IS-IS network
without a specified metric, IS-IS uses default metric values for the route, depending on
the protocol that was used to learn the route.
Table 11 on page 373 depicts IS-IS route export metric default values.

Table 11: Default Metric Values for Routes Exported into IS-IS
Protocol Used for Learning the Route

Default Metric Value

Direct

10

Static

Same as reported by the protocol used for exporting the route

Aggregate

10

Generate

10

RIP

Same as reported by the protocol used for exporting the route

OSPF

Same as reported by the protocol used for exporting the route

BGP

10

The default metric values behavior can be customized by using routing policies.
Options

metricMetric value.

Copyright 2015, Juniper Networks, Inc.

373

IS-IS Feature Guide for Routing Devices

Range: 1 through 63, or 1 through 16,777,215 (if you have configured wide metrics)
Default: 10 (for all interfaces except lo0), 0 (for the lo0 interface)
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 213

Understanding Wide IS-IS Metrics for Traffic Engineering on page 213

te-metric on page 408

wide-metrics-only on page 416

multicast-rpf-routes
Syntax
Hierarchy Level

Release Information
Description

multicast-rpf-routes;
[edit logical-systems logical-system-name protocols isis traffic-engineering family inet
shortcuts],
[edit logical-systems logical-system-name routing-instances traffic-engineering family inet
shortcuts],
[edit protocols isis traffic-engineering family inet shortcuts],
[edit routing-instances routing-instance-name protocols isis traffic-engineering family inet
shortcuts]

Statement introduced in Junos OS Release 9.3.


Install unicast IPv4 routes into the multicast routing table (inet.2) for multicast
reverse-path-forwarding (RPF) checks.
Traffic engineering shortcuts must be enabled. IPv4 multicast topology must not be
enabled. Label-switched paths (LSPs) must not be advertised into IS-IS.

Required Privilege
Level
Related
Documentation

374

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling IS-IS Traffic Engineering Support on page 191

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

multipath (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information
Description
Options

multipath {
lsp-equal-cost;
}
[edit logical-systems logical-system-name protocols isis traffic-engineering],
[edit protocols isis traffic-engineering]

Statement introduced in Junos OS Release 9.6.


Enable load balancing for multiple label-switched paths (LSPs).
lsp-equal-costConfigure LSPs to be retained as equal cost paths for load balancing

when a better route metric is added to the routing table.


When a route with an improved metric is added to the IS-IS internal routing table,
IS-IS flushes all next-hop information (including LSP next-hop information) for a
route. This is undesirable, because certain equal-cost multipath (ECMP) path
combinations can be lost during route calculation. To override this default IS-IS
behavior, include the lsp-equal-cost statement for load balancing, so that the equal
cost path information is retained in the routing table.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Example: Enabling IS-IS Traffic Engineering Support on page 191

lsp-equal-cost on page 365

multipath (Protocols BGP)

multipath (Routing Options)

traffic-engineering on page 413

Copyright 2015, Juniper Networks, Inc.

375

IS-IS Feature Guide for Routing Devices

no-adjacency-down-notification (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information
Description

no-adjacency-down-notification;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit protocols isis interface interface-name]

Statement introduced in Junos OS Release 8.0.


Disable adjacency down notification for IS-IS to allow for migration from IS-IS to OSPF
without disruption of the RSVP neighbors and associated RSVP-signaled label-switched
paths (LSPs).
Whenever IS-IS is deactivated, the IS-IS adjacencies are brought down. IS-IS signals to
RSVP to bring down any RSVP neighbors associated with the IS-IS adjacencies, and this
further causes the associated LSPs signaled by RSVP to go down as well.
A similar process occurs whenever OSPF is deactivated. The OSPF neighbors are brought
down. OSPF signals to RSVP to bring down any of the RSVP neighbors associated with
the OSPF neighbors, and this further causes the associated LSPs signaled by RSVP to
go down as well.
If you need to migrate from IS-IS to OSPF or from OSPF to IS-IS, the internal gateway
protocol (IGP) notification to RSVP for an adjacency or neighbor down event needs to
be ignored. Using the no-adjacency-down-notification or no-neighbor-down-notification
statements, you can disable IS-IS adjacency down notification or OSPF neighbor down
notification, respectively, until the migration is complete. The network administrator is
responsible for configuring the statements before the migration, and then removing them
from the configuration afterward, so that IGP notification can function normally.

Required Privilege
Level
Related
Documentation

376

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

no-neighbor-down-notification

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

no-adjacency-holddown
Syntax
Hierarchy Level

Release Information

Description

no-adjacency-holddown;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced in Junos OS Release 8.0.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Disable the hold-down timer for IS-IS adjacencies.
A hold-down timer delays the advertising of adjacencies by waiting until a time period
has elapsed before labeling adjacencies in the up state. You can disable this hold-down
timer, which labels adjacencies up faster. However, disabling the hold-down timer creates
more frequent link-state PDU updates and SPF computation.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

hold-time on page 344

Copyright 2015, Juniper Networks, Inc.

377

IS-IS Feature Guide for Routing Devices

no-authentication-check
Syntax
Hierarchy Level

Release Information

Description

Required Privilege
Level
Related
Documentation

no-authentication-check;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Generate authenticated packets and check the authentication on received packets, but
do not reject packets that cannot be authenticated.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

csnp-interval on page 330

hello-authentication-type on page 340

no-csnp-authentication
Syntax
Hierarchy Level

Release Information

Description
Required Privilege
Level
Related
Documentation

378

no-csnp-authentication;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Suppress authentication check on complete sequence number PDU (CSNP) packets.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

csnp-interval on page 330

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

node
Syntax

Hierarchy Level

Release Information
Description

node {
exclude [ node-address ];
preference [ node-address ];
}
[edit logical systems logical-system-name routing-options backup-selection (Protocols
ISIS) destination prefix interface interface name],
[edit logical-systems logical-system-name routing-instances instance-name routing-options
backup-selection destination prefix interface interface-name],
[edit routing-instances instance-name routing-options backup-selection destination prefix
interface interface-name],
[edit routing-options backup-selection (Protocols ISIS) destination prefix interface interface
name]

Statement introduced in Junos OS Release 14.1.


Define a list of loop-back IP addresses of the adjacent nodes to either prefer or exclude
in the backup path selection. The node can be a local (adjacent router) node, remote
node, or any other router in the backup path.

NOTE: The nodes are identified through the TE-router-ID TLV advertised by
a node in the LSP.

Options

exclude [ node-address ] Specify the list of nodes to be excluded. The backup path that

has a router from the list is not selected as the loop-free alternative or backup next
hop.
node-address Name of one or more nodes to be excluded during backup path

selection.
preference [ node-address ] Define an ordered set of nodes to be preferred. The backup

path having the leftmost node is selected.


node-address Name of one or more nodes to be preferred in the backup path

selection.
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

backup-selection (Protocols ISIS) on page 322

destination on page 331

interface on page 350

Copyright 2015, Juniper Networks, Inc.

379

IS-IS Feature Guide for Routing Devices

node-tag
Syntax

Hierarchy Level

Release Information
Description

node-tag {
exclude [ route-tag ];
preference [ route-tag ];
}
[edit logical-systems logical-system-name routing-options backup-selection (Protocols
ISIS) destination prefix interface interface name],
[edit logical-systems logical-system-name routing-instances instance-name routing-options
backup-selection destination prefix interface interface-name],
[edit routing-instances instance-name routing-options backup-selection destination prefix
interface interface-name],
[edit routing-options backup-selection destination prefix interface interface name]

Statement introduced in Junos OS Release 14.1.


Define per-neighbor policy to either prefer or exclude a backup path.

NOTE: This statement identifies a group of nodes in the network based on


criteria such as the same neighbor tag values for all PE nodes. This is
implemented using IS-IS admin-tags.

Options

exclude [ route-tag ] Specify that the backup path which has any node or router with

route-tag from this list is not selected as the loop-free alternative or backup-next
hop.
route-tag Name of one or more tags advertised as part of extended IP reachability

with a /32 prefix length that represents the TE-router-ID or node ID of a router.
preference [ route-tag ] Specify the set of route tags in descending order of preference.
route-tag Name of one or more tags advertised as part of extended IP reachability

with a /32 prefix length that represents the TE-router-ID or node ID of a router.
Required Privilege
Level
Related
Documentation

380

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Backup Selection Policy for IS-IS Protocol on page 46

Configuring Backup Selection Policy for IS-IS Protocol

backup-selection (Protocols ISIS) on page 322

destination on page 331

interface on page 350

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

node-link-protection (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

Required Privilege
Level
Related
Documentation

node-link-protection;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-routers logical-router-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced in Junos OS Release 9.5.


Statement introduced in Junos OS Release 9.5 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enable node-link protection on the specified IS-IS interface. Junos OS creates an alternate
loop-free path to the primary next hop for all destination routes that traverse a protected
interface. This alternate path avoids the primary next-hop routing device altogether and
establishes a path through a different routing device.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

link-protection on page 364

Copyright 2015, Juniper Networks, Inc.

381

IS-IS Feature Guide for Routing Devices

no-eligible-backup (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

Required Privilege
Level
Related
Documentation

no-eligible-backup;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced in Junos OS Release 9.5.


Statement introduced in Junos OS Release 9.5 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Exclude the specified interface as a backup interface for IS-IS interfaces on which link
protection or node-link protection is enabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

link-protection on page 364

node-link-protection on page 381

no-eligible-remote-backup
Syntax
Hierarchy Level

Release Information
Description

Required Privilege
Level
Related
Documentation

382

no-eligible-remote-backup;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit protocols isis interface interface-name]
[edit protocols (ospf | ospf3) area area-id interface interface-name]

Statement introduced in Junos OS Release 14.2.


Disable remote LFA backup calculation for the specified interface. If remote LFA is
disabled, Junos OS does not consider the interface for calculating the remote LFA next
hop.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

auto-targeted-session

backup-spf-options on page 323

interface on page 348

remote-backup-calculation on page 401

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

no-hello-authentication
Syntax
Hierarchy Level

Release Information

Description
Required Privilege
Level
Related
Documentation

no-hello-authentication;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Suppress authentication check on complete sequence number hello packets.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

hello-authentication-type on page 340

no-ipv4-multicast
Syntax
Hierarchy Level

Release Information

Description
Default
Required Privilege
Level
Related
Documentation

no-ipv4-multicast;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Exclude an interface from IPv4 multicast topologies.
Multicast topologies are disabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

383

IS-IS Feature Guide for Routing Devices

no-ipv4-routing
Syntax
Hierarchy Level

Release Information

Description

no-ipv4-routing;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Disable IP version 4 (IPv4) routing.
Disabling IPv4 routing has the following results:

The routing device does not advertise the network layer protocol identifier (NLPID) for
IPv4 in the Junos OS link-state PDU fragment zero.

The routing device does not advertise any IPv4 prefixes in Junos OS link-state PDUs.

The routing device does not advertise the NLPID for IPv4 in Junos OS hello packets.

The routing device does not advertise any IPv4 addresses in Junos OS hello packets.

The routing device does not calculate any IPv4 routes.

NOTE: Note: Even when no-ipv4-routing is configured, an IS-IS traceoptions


log can list rejected IPv4 addresses. When a configuration is committed, IS-IS
schedules a scan of the routing table to determine whether any routes need
to be exported into the IS-IS link state database. The implicit default export
policy action is to reject everything. IPv4 addresses from the routing table
are examined for export, rejected by the default policy, and the rejections are
logged.

Required Privilege
Level
Related
Documentation

384

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

no-ipv6-multicast
Syntax
Hierarchy Level

Release Information

Description
Default
Required Privilege
Level
Related
Documentation

no-ipv6-multicast;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Exclude an interface from the IPv6 multicast topologies.
Multicast topologies are disabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

385

IS-IS Feature Guide for Routing Devices

no-ipv6-routing
Syntax
Hierarchy Level

Release Information

Description

no-ipv6-routing;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Disable IP version 6 (IPv6) routing.
Disabling IPv6 routing has the following results:

Required Privilege
Level
Related
Documentation

386

The routing device does not advertise the network layer protocol identifier (NLPID) for
IPv6 in the Junos OS link-state PDU fragment zero.

The routing device does not advertise any IPv6 prefixes in Junos OS link-state PDUs.

The routing device does not advertise the NLPID for IPv6 in Junos OS hello packets.

The routing device does not advertise any IPv6 addresses in Junos OS hello packets.

The routing device does not calculate any IPv6 routes.

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

no-ipv6-unicast
Syntax
Hierarchy Level

Release Information

Description

Default
Required Privilege
Level
Related
Documentation

no-ipv6-unicast;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Exclude an interface from the IPv6 unicast topologies. This enables you to exercise control
over the paths that unicast data takes through a network.
IPv6 unicast topologies are disabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

no-psnp-authentication
Syntax
Hierarchy Level

Release Information

Description
Required Privilege
Level
Related
Documentation

no-psnp-authentication;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Suppress authentication check on partial sequence number PDU (PSNP) packets.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Configuring IS-IS Authentication on page 31

Copyright 2015, Juniper Networks, Inc.

387

IS-IS Feature Guide for Routing Devices

no-unicast-topology
Syntax
Hierarchy Level

Release Information

Description
Default
Required Privilege
Level
Related
Documentation

388

no-unicast-topology;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Exclude an interface from the IPv4 unicast topologies.
IPv4 unicast topologies are disabled.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

overload (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

overload {
advertise-high-metrics;
allow-route-leaking;
timeout seconds;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the local routing device so that it appears to be overloaded. This statement
causes the routing device to continue participating in IS-IS routing, but prevents it from
being used for transit traffic. Traffic destined to immediately attached subnets continues
to transit the routing device.
You can also advertise maximum link metrics in network layer reachability information
(NLRI) instead of setting the overload bit.
You configure or disable overload mode in IS-IS with or without a timeout. Without a
timeout, overload mode is set until it is explicitly deleted from the configuration. With a
timeout, overload mode is set if the time elapsed since the IS-IS instance started is less
than the specified timeout.
A timer is started for the difference between the timeout and the time elapsed since the
instance started. If the time elapsed after the IS-IS instance is enabled is less than the
specified timeout, overload mode is set. When the timer expires, overload mode is cleared.
In overload mode, the routing device IS-IS advertisements are originated with the overload
bit set. This causes the transit traffic to take paths around the routing device. However,
the overloaded routing devices own links are still accessible.
The value of the overload bit depends on these three scenarios:
1.

When the overload bit has already been set to a given value and the routing process
is restarted: Link-state PDUs are regenerated with the overload bit cleared.

2. When the overload bit is reset to a lesser value while the routing process is running:

Link-state PDUs are regenerated with the overload bit cleared.


3. When the overload bit is reset to a greater value while the routing process is running:

Link-state PDUs are regenerated with the overload bit set to the difference between
the old and new value.

Copyright 2015, Juniper Networks, Inc.

389

IS-IS Feature Guide for Routing Devices

In overload mode, the routing device advertisement is originated with all the transit routing
device links (except stub) set to a metric of 0xFFFF. The stub routing device links are
advertised with the actual cost of the interfaces corresponding to the stub. This causes
the transit traffic to avoid the overloaded routing device and take paths around the routing
device.
To understand the reason for setting the overload bit, consider that BGP converges slowly.
It is not very good at detecting that a neighbor is down because it has slow-paced
keepalive timers. Once the BGP neighbor is determined to be down, it can take up to 2
minutes for a BGP router to declare the neighbor down. IS-IS is much quicker. IS-IS only
takes 10-30 seconds to detect absent peers. It is the slowness of BGP, more precisely
the slowness of internal BGP (IBGP), that necessitates the use of the overload bit. IS-IS
and BGP routing are mutually dependent on each other. If both do not converge at the
same time, traffic is dropped without notification (black holed).
You might want to configure the routing device so that it appears to be overloaded when
you are restarting routing on the device. Setting the overload bit for a fixed amount of
time right after a restart of the routing protocol process (rpd) ensures that the router
does not receive transit traffic while the routing protocols (especially IBGP) are still
converging.
Setting the overload bit is useful when performing hardware or software maintenance
work on a routing device. After the maintenance work, clear the overload bit to carry on
forwarding transit traffic. Manual clearing of the overload bit is not always possible. What
is needed is an automated way of clearing the overload bit after some amount of time.
Most networks use a time value of 300 seconds. This 5-minute value provides a good
balance, allowing time to bring up even large internal IBGP meshes, while still relatively
quick.
Another appropriate application for setting for the overload bit is on dedicated devices
such as BGP route reflectors, which are intentionally not meant to carry any transit traffic.
In this case, you would not use the timer.
You can verify that the overload bit is set by running the show isis database command.

390

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

Options

advertise-high-metricsAdvertise maximum link metrics in NLRIs instead of setting the

overload bit.
The advertise-high-metric setting is only valid while the routing device is in overload mode.
When advertise-high-metric is configured, IS-IS does not set the overload bit. Rather,
it sets the metric to 63 or 16,777,214, depending whether wide metrics are enabled.
This allows the overloaded routing device to be used for transit as a last resort.
An L1-L2 router in overload mode stops leaking route information between L1 and L2
levels and clears its attached bit. This is also true when advertise-high-metrics is
configured.
allow-route-leakingEnable leaking of route information into the network even if the

overload bit is set.

NOTE: The allow-route-leaking option does not work if the routing device is
in dynamic overload mode. Dynamic overload can occur if the device has
exceeded its resource limits, such as the prefix limit.

timeout secondsNumber of seconds at which the overloading is reset.

Range: 60 through 1800 seconds


Default: 0 seconds
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

Copyright 2015, Juniper Networks, Inc.

391

IS-IS Feature Guide for Routing Devices

passive (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

passive {
remote-node-id address;
remote-node-iso iso-id;
}
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
remote-node-id address option introduced in Junos OS Release 14.2.
remote-node-iso iso-id option introduced in Junos OS Release 14.2.
Advertise the direct interface addresses on an interface or into a level on the interface
without actually running IS-IS on that interface or level.
This statement effectively prevents IS-IS from running on the interface. To enable IS-IS
on an interface, include the interface statement at the [edit protocols isis] or the [edit
routing-instances routing-instance-name protocols isis] hierarchy level. To disable it,
include the disable statement at those hierarchy levels. The three statesenabling,
disabling, or not running IS-IS on an interfaceare mutually exclusive.

NOTE: Configuring IS-IS on a loopback interface automatically renders it as


a passive interface, irrespective of whether the passive statement was used
in the configuration of the interface.

If neither passive mode nor the family iso option is configured on the IS-IS interface, then
the routing device treats the interface as not being operational, and no direct IPv4/IPv6
routes are exported into IS-IS. (You configure the family iso option at the [edit interfaces
interface-name unit logical-unit-number] hierarchy level.)
Default

Options

392

By default, IS-IS must be configured on an interface or a level for direct interface addresses
to be advertised into that level.
remote-node-id addressIP address of the remote link.

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

remote-node-iso iso-idISO ID of the remote node.

NOTE: The options remote-node-id address and remote-node-iso iso-id do not


apply under the [edit routing-instances routing-instance-name protocols isis]
hierarchy level.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring a Multi-Level IS-IS Topology to Control Interarea Flooding on


page 20

disable on page 333

point-to-point
Syntax
Hierarchy Level

Release Information

Description

point-to-point;
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure an IS-IS interface to behave like a point-to-point connection.
You can use the point-to-point statement to configure a LAN interface to act like a
point-to-point interface for IS-IS. You do not need an unnumbered LAN interface, and it
has no effect if configured on an interface that is already point-to-point.
The point-to-point statement affects only IS-IS protocol procedures on that interface.
All other protocols continue to treat the interface as a LAN interface. Only two IS-IS
routing devices can be connected to the LAN interface, and both must be configured as
point-to-point.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

IS-IS Overview on page 3

Example: Configuring Synchronization Between IS-IS and LDP on page 217

Understanding LDP-IGP Synchronization on page 215

Understanding IS-IS Designated Routers on page 28

Copyright 2015, Juniper Networks, Inc.

393

IS-IS Feature Guide for Routing Devices

preference (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

preference preference;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the preference of internal routes.
Route preferences (also known as administrative distances) are used to select which
route is installed in the forwarding table when several protocols calculate routes to the
same destination. The route with the lowest preference value is selected.
To change the preference values, include the preference statement (for internal routes)
or the external-preference statement.

Options

preferencePreference value.
32

Range: 0 through 4,294,967,295 (2

1)

Default: 15 (for Level 1 internal routes), 18 (for Level 2 internal routes), 160 (for Level 1
external routes), 165 (for Level 2 external routes)
Required Privilege
Level
Related
Documentation

394

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Route Preferences Overview

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS on page 98

Example: Redistributing OSPF Routes into IS-IS on page 83

Understanding Routing Policies on page 43

Understanding BGP Communities and Extended Communities as Routing Policy Match


Conditions on page 97

external-preference on page 335

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

prefix-export-limit (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

prefix-export-limit number;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure a limit to the number of prefixes exported into IS-IS.
By default, there is no limit to the number of prefixes that can be exported into IS-IS. To
configure a limit to the number of prefixes that can be exported into IS-IS, include the
prefix-export-limit statement. The prefix-export-limit statement protects the rest of the
network from a malicious policy by applying a threshold filter for exported routes.
The number of prefixes depends on the size of your network. Good design advice is to
set it to double the total number of IS-IS Level 1 and Level 2 routing devices in your
network.
If the number of prefixes exported into IS-IS exceeds the configured limit, the overload
bit is set and the overload state is reached. When other routers detect that this bit is set,
they do not use this routing device for transit traffic, but they do use it for packets destined
to the overloaded routing devices directly connected networks and IP prefixes. The
overload state can be cleared by using the clear isis overload command.
The show isis overview command displays the prefix export limit when it is configured.

Options

numberPrefix limit.
32

Range: 0 through 4,294,967,295 (2

1)

Default: None
Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Redistributing OSPF Routes into IS-IS on page 83

Example: Configuring a Routing Policy to Redistribute BGP Routes with a Specific


Community Tag into IS-IS on page 98

Understanding BGP Communities and Extended Communities as Routing Policy Match


Conditions on page 97

Understanding Routing Policies on page 43

Copyright 2015, Juniper Networks, Inc.

395

IS-IS Feature Guide for Routing Devices

priority (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

priority number;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure the interfaces priority for becoming the designated router. The interface with
the highest priority value becomes that levels designated router.
The priority value is meaningful only on a multiaccess network. It has no meaning on a
point-to-point interface.
A routing device advertises its priority to become a designated router in its hello packets.
On all multiaccess networks, IS-IS uses the advertised priorities to elect a designated
router for the network. This routing device is responsible for sending network link-state
advertisements, which describe all the routing devices attached to the network. These
advertisements are flooded throughout a single area.
A routing devices priority for becoming the designated router is indicated by an arbitrary
number from 0 through 127. Routing devices with a higher value are more likely to become
the designated router.

Options

numberPriority value.

Range: 0 through 127


Default: 64
Required Privilege
Level
Related
Documentation

396

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS Designated Routers

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

protocols
Syntax

protocols {
bgp {
... bgp-configuration ...
}
isis {
... isis-configuration ...
}
ldp {
... ldp-configuration ...
}
mpls {
... mpls -configuration ...
}
msdp {
... msdp-configuration ...
}
mstp {
... mstp-configuration ...
}
ospf {
domain-id domain-id;
domain-vpn-tag number;
route-type-community (iana | vendor);
traffic-engineering {
<advertise-unnumbered-interfaces>;
<credibility-protocol-preference>;
ignore-lsp-metrics;
multicast-rpf-routes;
no-topology;
shortcuts {
lsp-metric-into-summary;
}
}
... ospf-configuration ...
}
ospf3 {
domain-id domain-id;
domain-vpn-tag number;
route-type-community (iana | vendor);
traffic-engineering {
<advertise-unnumbered-interfaces>;
<credibility-protocol-preference>;
ignore-lsp-metrics;
multicast-rpf-routes;
no-topology;
shortcuts {
lsp-metric-into-summary;
}
}
... ospf3-configuration ...
}
pim {

Copyright 2015, Juniper Networks, Inc.

397

IS-IS Feature Guide for Routing Devices

... pim-configuration ...


}
rip {
... rip-configuration ...
}
ripng {
... ripng-configuration ...
}
rstp {
rstp-configuration;
}
rsvp{
... rsvp-configuration ...
}
vstp {
vstp configuration;
}
vpls {
vpls configuration;
}
}

Hierarchy Level

Release Information

Description

398

[edit logical-systems logical-system-name routing-instances routing-instance-name],


[edit routing-instances routing-instance-name]

Statement introduced before Junos OS Release 7.4.


Support for RIPng introduced in Junos OS Release 9.0.
Statement introduced in Junos OS Release 11.1 for EX Series switches.
Statement introduced in Junos OS Release 11.3 for the QFX Series.
mpls and rsvp options added in Junos OS Release 15.1.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Specify the protocol for a routing instance. You can configure multiple instances of many
protocol types. Not all protocols are supported on the switches. See the switch CLI.

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

Options

bgpSpecify BGP as the protocol for a routing instance.


isisSpecify IS-IS as the protocol for a routing instance.
ldpSpecify LDP as the protocol for a routing instance or for a virtual router instance.
l2vpnSpecify Layer 2 VPN as the protocol for a routing instance.
mplsSpecify MPLS as the protocol for a routing instance.
msdpSpecify the Multicast Source Discovery Protocol (MSDP) for a routing instance.
mstpSpecify the Multiple Spanning Tree Protocol (MSTP) for a virtual switch routing

instance.
ospfSpecify OSPF as the protocol for a routing instance.
ospf3Specify OSPF version 3 (OSPFv3) as the protocol for a routing instance.

NOTE: OSPFv3 supports the no-forwarding, virtual-router, and vrf routing


instance types only.

pimSpecify the Protocol Independent Multicast (PIM) protocol for a routing instance.
ripSpecify RIP as the protocol for a routing instance.
ripngSpecify RIP next generation (RIPng) as the protocol for a routing instance.
rstpSpecify the Rapid Spanning Tree Protocol (RSTP) for a virtual switch routing

instance.
rsvpSpecify the RSVP for a routing instance.
vstpSpecify the VLAN Spanning Tree Protocol (VSTP) for a virtual switch routing

instance.
vplsSpecify VPLS as the protocol for a routing instance.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Multiple Routing Instances of OSPF

Copyright 2015, Juniper Networks, Inc.

399

IS-IS Feature Guide for Routing Devices

reference-bandwidth (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information

Description

reference-bandwidth reference-bandwidth;
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Optimize routing based on bandwidth by setting the reference bandwidth used in
calculating the default interface cost.
All IS-IS interfaces have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. Routes with lower total path metrics are preferred over those with higher
path metrics. When there are several equal-cost routes to a destination, traffic is
distributed equally among them.
The cost of a route is described by a single dimensionless metric that is determined using
the following formula:
cost = reference-bandwidth/bandwidth

For example, if you set the reference bandwidth to 1 Gbps (that is, reference-bandwidth
is set to 1,000,000,000), a 100-Mbps interface has a routing metric of 10.
All IS-IS interfaces have a cost, which is a routing metric that is used in the IS-IS link-state
calculation. Routes with lower total path metrics are preferred over those with higher
path metrics.
Options

reference-bandwidthReference bandwidth value in bits per second.

Range: 9600 through 1,000,000,000,000 bps


Default: None
Required Privilege
Level
Related
Documentation

400

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding IS-IS Configuration on page 13

Example: Configuring IS-IS on page 14

http://www.juniper.net/us/en/training/certification/JNCIP_studyguide.pdf

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

remote-backup-calculation
Syntax
Hierarchy Level

Release Information
Description

Required Privilege
Level
Related
Documentation

remote-backup-calculation;
[edit logical-systems logical-system-name protocols isis backup-spf-options],
[edit protocols isis backup-spf-options]

Statement introduced in Junos OS Release 14.2.


Determine the remote LFA backup paths from the point of local repair (PLR) in an IS-IS
network. For every protected link on the PLR, Junos OS creates a dynamic LDP
label-switched path to reach the remote LFA node. When the primary link fails, the PLR
uses these remote LFA backup paths to reach all the destinations reachable via the
primary-link.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

auto-targeted-session

backup-spf-options on page 323

no-eligible-remote-backup on page 382

Copyright 2015, Juniper Networks, Inc.

401

IS-IS Feature Guide for Routing Devices

rib-group (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

rib-group {
inet group-name;
inet6 group-name;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Install routes learned from IS-IS routing instances into routing tables in the IS-IS routing
table group. You can install IPv4 routes or IPv6 routes.
Support for IPv6 routing table groups in IS-IS enables IPv6 routes that are learned from
IS-IS routing instances to be installed into other routing tables defined in an IS-IS routing
table group.

Options

group-nameName of the routing table group.

inetInstall IPv4 IS-IS routes.


inet6Install IPv6 IS-IS routes.
Required Privilege
Level
Related
Documentation

402

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Exporting Specific Routes from One Routing Table Into Another Routing Table

Example: Importing Direct and Static Routes Into a Routing Instance

Understanding Multiprotocol BGP

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

routing-instances (Multiple Routing Entities)


Syntax
Hierarchy Level

Release Information
Description

routing-instances routing-instance-name { ... }


[edit],
[edit logical-systems logical-system-name]

Statement introduced before Junos OS Release 7.4.


Configure an additional routing entity for a router. You can create multiple instances of
BGP, IS-IS, OSPF, OSPFv3, and RIP for a router. You can also create multiple routing
instances for separating routing tables, routing policies, and interfaces for individual
wholesale subscribers (retailers) in a Layer 3 wholesale network.
Each routing instance consist of the following:

A set of routing tables

A set of interfaces that belong to these routing tables

A set of routing option configurations

Each routing instance has a unique name and a corresponding IP unicast table. For
example, if you configure a routing instance with the name my-instance, its corresponding
IP unicast table is my-instance.inet.0. All routes for my-instance are installed into
my-instance.inet.0.
Routes are installed into the default routing instance inet.0 by default, unless a routing
instance is specified.
In Junos OS Release 9.0 and later, you can no longer specify a routing-instance name of
master, default, or bgp or include special characters within the name of a routing instance.
In Junos OS Release 9.6 and later, you can include a slash (/) in a routing-instance name
only if a logical system is not configured. That is, you cannot include the slash character
in a routing-instance name if a logical system other than the default is explicitly configured.
Routing-instance names, further, are restricted from having the form __.*__ (beginning
and ending with underscores). The colon : character cannot be used when multitopology
routing (MTR) is enabled.
Default
Options

Routing instances are disabled for the router.


routing-instance-nameName of the routing instance. This must be a non-reserved string

of not more than 128 characters.


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring Interprovider Layer 3 VPN Option A

Example: Configuring Interprovider Layer 3 VPN Option B

Copyright 2015, Juniper Networks, Inc.

403

IS-IS Feature Guide for Routing Devices

Example: Configuring Interprovider Layer 3 VPN Option C

shortcuts (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

shortcuts {
multicast-rpf-routes;
}
[edit logical-systems logical-system-name protocols isis traffic-engineering family (inet |
inet6)],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis traffic-engineering family (inet | inet6)],
[edit protocols isis traffic-engineering family (inet | inet6)],
[edit routing-instances routing-instance-name protocols isis traffic-engineering family (inet
| inet6)]

Statement introduced before Junos OS Release 7.4.


The family statement and support for IPv6 routes for IS-IS traffic engineering shortcuts
introduced in Junos OS Release 9.3.
Configure IS-IS to use MPLS label-switched paths (LSPs) as next hops if possible when
installing routing information into the inet.3 or inet6.3 routing table. Internal gateway
protocol (IGP) shortcuts allow the IGP to install prefixes in inet.3 or inet6.3.
It is only necessary to enable IGP shortcuts on the ingress router because that is the router
performing the shortest-path-first (SPF) calculations.
It is important to understand how IGP shortcuts affect the protocol and routing table
relationship. The IGP performs SPF calculations to subnets downstream of LSP egress
points, but the results of these calculations are entered into the inet.3 table only. At the
same time, the IGP performs its traditional SPF calculations and enters the results of
these calculations into the inet.0 table. The result is that although the IGP is making
entries into the inet.3 table, BGP is still the only protocol with visibility into that table for
the purposes of route resolution. Therefore, forwarding to AS-internal destinations still
uses the inet.0 IGP routes, and the LSPs are only used for BGP next-hop resolution. If
you want the LSPs to be used for IGP next-hop resolution, you must configure
traffic-engineering bgp-igp.
The remaining statement is explained separately.

Required Privilege
Level
Related
Documentation

404

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling IS-IS Traffic Engineering Support on page 191

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

traffic-engineering (Protocols IS-IS) on page 413

traffic-engineering (Protocols MPLS)

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

spf-options (Protocols IS-IS)


Syntax

Hierarchy Level

spf-options {
delay milliseconds;
holddown milliseconds;
rapid-runs number;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Release Information

Statement introduced in Junos OS Release 8.5.


Statement introduced in Junos OS Release 9.0 for EX Series switches.

Description

Configure options for running the shortest-path-first (SPF) algorithm.


Running the SPF algorithm is usually the beginning of a series of larger system-wide
events. For example, the SPF algorithm can lead to interior gateway protocol (IGP) prefix
changes, which then lead to BGP nexthop resolution changes. Consider what happens
if there are rapid link changes in the network. The local routing device can become
overwhelmed. This is why it sometimes makes sense to throttle the scheduling of the
SPF algorithm.
You can configure the following SPF options:

The delay in the time between the detection of a topology change and when the SPF
algorithm actually runs.

The maximum number of times that the SPF algorithm can run in succession before
the hold-down timer begins.

The time to hold down, or wait, before running another SPF calculation after the SPF
algorithm has run in succession the configured maximum number of times.

If the network stabilizes during the hold-down period and the SPF algorithm does not
need to run again, the system reverts to the configured values for the delay and rapid-runs
statements.
Options

delay millisecondsTime interval between the detection of a topology change and when

the SPF algorithm runs.


Range: 50 through 1000 milliseconds
Default: 200 milliseconds
holddown millisecondsTime interval to hold down, or wait before a subsequent SPF

algorithm runs after the SPF algorithm has run the configured maximum number of
times in succession.
Range: 2000 through 10,000 milliseconds
Default: 5000 milliseconds

Copyright 2015, Juniper Networks, Inc.

405

IS-IS Feature Guide for Routing Devices

rapid-runs numberMaximum number of times the SPF algorithm can run in succession.

After the maximum is reached, the holddown interval begins.


Range: 1 through 5
Default: 3
Required Privilege
Level
Related
Documentation

406

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

static-host-mapping
Syntax

Hierarchy Level
Release Information
Description

Default

Options

static-host-mapping {
hostname {
alias [ aliases ];
inet [ addresses ];
inet6 [ addresses];
sysid system-identifier;
}
}
[edit system]

Statement introduced before Junos OS Release 7.4.


(Optional) Statically map a hostname to one or more IP addresses and aliases, and
configure an International Organization for Standardization (ISO) system identifier
(system ID).
If you do not statically map the hostname, the mapping is generated dynamically, based
on the system configuration. For instance, if you omit the static-host-mapping hostname
sysid statement, the IS-IS system ID is dynamically generated from the host portion of
the ISO address configured on the loopback interface (lo0) and is mapped to the
host-name statement configured at the [edit system] hierarchy level.
alias aliasAlias for the hostname.
hostnameFully qualified hostname.
inet addressIP address. You can specify one or more IP addresses for the host.
inet6 addressIP address. You can specify one or more IPv6 addresses for the host.
sysid system-identifierISO system identifier (system ID). This is the 6-byte portion of

the Intermediate System-to-Intermediate System (IS-IS) network service access


point (NSAP). We recommend that you use the hosts IP address represented in
binary-coded decimal (BCD) format. For example, the IP address 208.197.169.18 is
2081.9716.9018 in BCD.
Required Privilege
Level
Related
Documentation

systemTo view this statement in the configuration.


system-controlTo add this statement to the configuration.

Configuring the Hostname of a Router or Switch by Using a Configuration Group

Copyright 2015, Juniper Networks, Inc.

407

IS-IS Feature Guide for Routing Devices

te-metric (Protocols IS-IS)


Syntax
Hierarchy Level

Release Information
Description

te-metric metric;
[edit logical-systems logical-system-name protocols isis interface interface-name level
level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name level level-number],
[edit protocols isis interface interface-name level level-number],
[edit routing-instances routing-instance-name protocols isis interface interface-name level
level-number]

Statement introduced before Junos OS Release 7.4.


Set the metric value used by traffic engineering for information injected into the traffic
engineering database. The value of the traffic engineering metric does not affect normal
IS-IS forwarding.
When traffic engineering is enabled on the routing device, you can use this statement to
configure an IS-IS metric that is used exclusively for traffic engineering.

Options

metricMetric value.

Range: 1 through 16,777,215


Default: Value of the IGP metric
Required Privilege
Level
Related
Documentation

408

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

metric on page 373

wide-metrics-only on page 416

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

topologies (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

topologies {
ipv4-multicast;
ipv6-multicast;
ipv6-unicast;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure alternate IS-IS topologies.
The remaining statements are explained separately.

Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Configuring IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Example: Configuring IS-IS Multicast Topology on page 128

IS-IS Multicast Topologies Overview on page 127

Understanding IS-IS IPv4 and IPv6 Unicast Topologies on page 150

Copyright 2015, Juniper Networks, Inc.

409

IS-IS Feature Guide for Routing Devices

traceoptions (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

traceoptions {
file name <size size> <files number> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
[edit logical-systems logical-system-name protocols isis],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis],
[edit protocols isis],
[edit routing-instances routing-instance-name protocols isis]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure IS-IS protocol-level tracing options. To specify more than one tracing operation,
include multiple flag statements.

NOTE: The traceoptions statement is not supported on QFabric systems.

Default

The default IS-IS protocol-level tracing options are those inherited from the routing
protocols traceoptions statement included at the [edit routing-options] hierarchy level.

Options

disable(Optional) Disable the tracing operation. You can use this option to disable a

single operation when you have defined a broad group of tracing operations, such
as all.
file nameName of the file to receive the output of the tracing operation. Enclose the

name within quotation marks ( ). All files are placed in the directory /var/log. We
recommend that you place IS-IS tracing output in the file isis-log.
files number(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and

so on, until the maximum number of trace files is reached. Then, the oldest trace file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
Range: 2 through 1000 files
Default: 10 files
flag flagTracing operation to perform. To specify more than one flag, include multiple
flag statements.
IS-IS Protocol-Specific Tracing Flags

410

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

csnComplete sequence number PDU (CSNP) packets

errorErrored IS-IS packets

graceful-restartGraceful restart operation

helloHello packets

ldp-synchronizationSynchronization between IS-IS and LDP

lspLink-state PDUs

lsp-generationLink-state PDU generation packets

packetsAll IS-IS protocol packets

psnPartial sequence number PDU (PSNP) packets

spfShortest-path-first calculations

Global Tracing Flags

allAll tracing operations

generalA combination of the normal and route trace operations

normalAll normal operations, including adjacency changes

Default: If you do not specify this option, only unusual or abnormal operations are traced.

policyPolicy operations and actions

routeRouting table changes

stateState transitions

taskRouting protocol task processing

timerRouting protocol timer processing

flag-modifier(Optional) Modifier for the tracing flag. You can specify one or more of

these modifiers:

detailProvide detailed trace information.

receiveTrace the packets being received.

sendTrace the packets being transmitted.

no-world-readable(Optional) Prevent any user from reading the log file.

Copyright 2015, Juniper Networks, Inc.

411

IS-IS Feature Guide for Routing Devices

size size(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),

or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then, the oldest trace file is
overwritten. Note that if you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
world-readable(Optional) Allow any user to read the log file.

Required Privilege
Level
Related
Documentation

412

routing and traceTo view this statement in the configuration.


routing-control and trace-controlTo add this statement to the configuration.

Example: Configuring the Transmission Frequency for CSNPs on IS-IS Interfaces

Example: Enabling Packet Checksums on IS-IS Interfaces for Error Checking on page 39

Example: Configuring the Transmission Frequency for Link-State PDUs on IS-IS


Interfaces on page 224

Understanding Link-State PDU Throttling for IS-IS Interfaces on page 223

Understanding Checksums on IS-IS Interfaces for Error Checking on page 38

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

traffic-engineering (Protocols IS-IS)


Syntax

Hierarchy Level

Release Information

Description

traffic-engineering {
disable;
credibility-protocol-preference;
family inet {
shortcuts {
multicast-rpf-routes;
}
}
family inet6 {
shortcuts;
}
multipath {
lsp-equal-cost;
}
}
[edit logical-systems logical-system-name protocols isis],
[edit protocols isis]

Statement introduced before Junos OS Release 7.4.


Support for the family statement introduced in Junos OS Release 9.3.
Support for the credibility-protocol-preference statement introduced in Junos OS Release
9.4.
Support for the multipath statement introduced in Junos OS Release 9.6.
Support for the lsp-equal-cost statement introduced in Junos OS Release 9.6.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure traffic engineering properties for IS-IS.
IS-IS always performs shortest-path-first (SPF) calculations to determine next hops.
For prefixes reachable through a particular next hop, IS-IS places that next hop for that
prefix in the inet.0 routing table. In addition, for routers running MPLS, IS-IS installs the
prefix for IPv4 routes in the inet.3 routing table as well. The inet.3 table, which is present
on the ingress router, contains the host address of each MPLS label-switched path (LSP)
egress router. BGP uses this routing table to resolve next-hop addresses.
If you enable IS-IS traffic engineering shortcuts and if there is a label-switched path to
a point along the path to that prefix, IS-IS installs the prefix in the inet.3 routing table
and uses the LSP as a next hop. The net result is that for BGP egress routers for which
there is no LSP, BGP automatically uses an LSP along the path to reach the egress router.
In Junos OS Release 9.3 and later, IS-IS traffic engineering shortcuts support IPv6 routes.
LSPs to be used for shortcuts continue to be signaled using IPv4. However, by default,
shortcut routes calculated through IPv6 routes are added to the inet6.3 routing table.
The default behavior is for only BGP to use LSPs in its calculations. If you configure MPLS
so that both BGP and interior gateway protocols use LSPs for forwarding traffic, shortcut
routes calculated through IPv6 are added to the inet6.0 routing table. IS-IS ensures that
the IPv6 routes running over the IPv4 MPLS LSP are correctly de-encapsulated at the

Copyright 2015, Juniper Networks, Inc.

413

IS-IS Feature Guide for Routing Devices

tunnel egress by pushing an extra IPv6 explicit null label between the IPv6 payload and
the IPv4 transport label.
RSVP LSPs with a higher preference than IS-IS routes are not considered during the
computation of traffic engineering shortcuts.
To configure IS-IS so that it uses LSPs as shortcuts when installing information in the
inet.3 or inet6.3 routing table, include the following statements:
family inet {
shortcuts {
multicast-rpf-routes;
}
}
family inet6 {
shortcuts;
}

For IPv4 traffic, include the inet statement. For IPv6 traffic, include the inet6 statement.
To configure load balancing across multiple LSPs, include the multipath statement.
When traffic engineering shortcuts are used, RSVP first looks at the metric2 value, which
is derived from the IGP cost. After this, RSVP considers the LSP metric value. So, if a
certain path changes for an LSP and the cost changes, not all LSPs are used to loadbalance the network.
When a route with an improved metric is added to the IS-IS internal routing table, IS-IS
flushes all next-hop information (including LSP next-hop information) for a route. This
is undesirable, because certain equal-cost multipath (ECMP) combinations can be lost
during route calculation. To override this default behavior for load balancing, include the
lsp-equal-cost statement to retain the equal cost path information in the routing table.
multipath {
lsp-equal-cost;
}

Because the inet.3 routing table is present only on ingress routers, you can configure LSP
shortcuts only on these routers.
Default

IS-IS traffic engineering support is enabled.


By default, IS-IS supports traffic engineering by exchanging basic information with the
traffic engineering database. To disable this support, and to disable IS-IS shortcuts if
they are configured, include the disable statement.

414

Copyright 2015, Juniper Networks, Inc.

Chapter 16: Configuration Statements

Options

credibility-protocol-preferenceSpecify that IS-IS should use the configured protocol

preference for IGP routes to determine the traffic engineering database credibility
value. By default, the traffic engineering database prefers IS-IS routes even when
the routes of another IGP are configured with a lower, that is, more preferred value.
Use this statement to override this default behavior.
The traffic engineering database assigns a credibility value to each IGP and prefers
the routes of the IGP with the highest credibility value. In Junos OS Release 9.4 and
later, you can configure IS-IS to take protocol preference into account to determine
the traffic engineering database credibility value. When protocol preference is used
to determine the credibility value, IS-IS routes are not automatically preferred by
the traffic engineering database, depending on your configuration. For example,
OSPF routes have a default preference value of 10, whereas IS-IS Level 1 routes have
a default preference value of 15. When protocol preference is enabled, the credibility
value is determined by deducting the protocol preference value from a base value
of 512. Using default protocol preference values, OSPF has a credibility value of 502,
whereas IS-IS has a credibility value of 497. Because the traffic engineering database
prefers IGP routes with the highest credibility value, OSPF routes are now preferred.

NOTE: This feature is also supported for OSPFv2.

lsp-equal-costConfigure LSPs to be retained as equal cost paths for load balancing

when a better path metric is found during the IS-IS internal routing table calculation.
When a route with an improved metric is added to the IS-IS internal routing table,
IS-IS flushes all next-hop information (including LSP next-hop information) for a
route. This is undesirable, because certain equal-cost multipath (ECMP) combinations
can be lost during route calculation. To override this default IS-IS behavior, include
the lsp-equal-cost statement for load balancing, so that the equal cost path
information is retained in the routing table.
multipathEnable load balancing for multiple LSPs.

The remaining statements are explained separately.


Required Privilege
Level
Related
Documentation

routingTo view this statement in the configuration.


routing-controlTo add this statement to the configuration.

Example: Enabling OSPF Traffic Engineering Support

Example: Enabling IS-IS Traffic Engineering Support on page 191

traffic-engineering (OSPF)

Using Labeled-Switched Paths to Augment SPF to Compute IGP Shortcuts on page 190

Copyright 2015, Juniper Networks, Inc.

415

IS-IS Feature Guide for Routing Devices

wide-metrics-only
Syntax
Hierarchy Level

Release Information

Description

wide-metrics-only;
[edit logical-systems logical-system-name protocols isis level level-number],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis level level-number],
[edit protocols isis level level-number],
[edit routing-instances routing-instance-name protocols isis level level-number]

Statement introduced before Junos OS Release 7.4.


Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Configure IS-IS to generate metric values greater than 63 on a per IS-IS level basis.
Normally, IS-IS metrics can have values up to 63, and IS-IS generates two type, length,
and value (TLV) tuples, one for an IS-IS adjacency and the second for an IP prefix. To
allow IS-IS to support traffic engineering, a second pair of TLVs has been added to IS-IS,
one for IP prefixes and the second for IS-IS adjacency and traffic engineering information.
24
With these TLVs, IS-IS metrics can have values up to 16,777,215 (2 1).
To configure IS-IS to generate only the new pair of TLVs and thus to allow the wider
range of metric values, include the wide-metrics-only statement.

Default

Required Privilege
Level
Related
Documentation

416

By default, Junos OS supports the sending and receiving of wide metrics. Junos OS allows
a maximum metric value of 63 and generates both pairs of TLVs.
routingTo view this statement in the configuration.
routing-controlTo add this statement to the configuration.

Example: Enabling Wide IS-IS Metrics for Traffic Engineering

te-metric on page 408

Copyright 2015, Juniper Networks, Inc.

CHAPTER 17

Operational Commands

clear bfd adaptation

clear bfd session

clear isis adjacency

clear isis database

clear isis overload

clear isis statistics

ping clns

restart

show bfd session

show isis adjacency

show isis adjacency holddown

show isis authentication

show isis backup coverage

show isis backup label-switched-path

show backup-selection

show isis backup spf results

show isis context-identifier

show isis database

show isis hostname

show isis interface

show isis overview

show isis route

show isis spf

show isis statistics

show policy

show policy conditions

show route

show route active-path

Copyright 2015, Juniper Networks, Inc.

417

IS-IS Feature Guide for Routing Devices

418

show route advertising-protocol

show route all

show route best

show route brief

show route detail

show route exact

show route export

show route extensive

show route forwarding-table

show route hidden

show route inactive-path

show route instance

show route next-hop

show route output

show route protocol

show route receive-protocol

show route table

show route terse

show security keychain

test policy

traceroute clns

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

clear bfd adaptation


Syntax

Release Information
Description

clear bfd adaptation


<address session-address>
<discriminator discr-number>

Command introduced before Junos OS Release 7.4.


Clear adaptation for Bidirectional Forwarding Detection (BFD) sessions. BFD is a simple
hello mechanism that detects failures in a network. Configured BFD interval timers can
change, adapting to network situations. Use this command to return BFD interval timers
to their configured values.
The clear bfd adaptation command is hitless, meaning that the command does not affect
traffic flow on the routing device.

Options

noneClear adaptation for all BFD sessions.


address session-address(Optional) Clear adaptation for all BFD sessions matching the

specified address.
discriminator discr-number(Optional) Clear adaptation for the local BFD session

matching the specified discriminator.


Additional Information

Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

For more information, see the description of the bfd-liveness-detection configuration


statement in the Junos Routing Protocols Configuration Guide.
clear

show bfd session on page 441

clear bfd adaptation on page 419


When you enter this command, you are provided feedback on the status of your request.

Sample Output
clear bfd adaptation
user@host> clear bfd adaptation

Copyright 2015, Juniper Networks, Inc.

419

IS-IS Feature Guide for Routing Devices

clear bfd session


List of Syntax

Syntax

Syntax (EX Series


Switch and QFX
Series)
Release Information

Description
Options

Syntax on page 420


Syntax (EX Series Switch and QFX Series) on page 420
clear bfd session
<address session-address>
<discriminator discr-number>
<logical-system (all | logical-system-name)>
clear bfd session
<address session-address>
<discriminator discr-number>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 12.1 for the QFX Series.
Drop one or more Bidirectional Forwarding Detection (BFD) sessions.
noneDrop all BFD sessions.
address session-address(Optional) Drop all BFD sessions matching the specified address.
discriminator discr-number(Optional) Drop the local BFD session matching the specified

discriminator.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

clear

show bfd session on page 441

clear bfd session on page 420


When you enter this command, you are provided feedback on the status of your request.

Sample Output
clear bfd session
user@host> clear bfd session

420

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

clear isis adjacency


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)

Release Information

Description
Options

Syntax on page 421


Syntax (EX Series Switches and QFX Series) on page 421
clear isis adjacency
<all>
<instance instance-name>
<interface interface-name>
<logical-system (all | logical-system-name)>
<neighbor>
clear isis adjacency
<all>
<instance instance-name>
<interface interface-name>
<neighbor>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
all option introduced in Junos OS Release 14.2.
Remove entries from the IS-IS adjacency database.
none | all(Optional) Remove all entries from the adjacency database.

Both clear isis adjacency and clear isis adjacency all function identically.
instance instance-name(Optional) Clear all adjacencies for the specified routing instance

only.
interface interface-name(Optional) Clear all adjacencies for the specified interface only.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


neighbor(Optional) Clear adjacencies for the specified neighbor only.

Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

clear

show isis adjacency on page 450

clear isis adjacency on page 422


clear isis adjacency all on page 422
See show isis adjacency for an explanation of output fields.

Copyright 2015, Juniper Networks, Inc.

421

IS-IS Feature Guide for Routing Devices

Sample Output
clear isis adjacency
The following sample output displays IS-IS adjacency database information before and
after the clear isis adjacency command is entered:
user@host> show isis adjacency
IS-IS adjacency database:
Interface
System
so-1/0/0.0
karakul
so-1/1/3.0
1921.6800.5080
so-5/0/0.0
1921.6800.5080

L
3
3
3

State
Up
Up
Up

Hold (secs) SNPA


26
23
19

user@host> clear isis adjacency karakul

user@host> show isis adjacency


IS-IS adjacency database:
Interface
System
so-1/0/0.0
karakul
so-1/1/3.0
1921.6800.5080
so-5/0/0.0
1921.6800.5080

L
3
3
3

State
Hold (secs) SNPA
Initializing
26
Up
24
Up
21

user@host> clear isis adjacency all


IS-IS adjacency database:
Interface
System
L
so-1/0/0.0
karakul
3
so-1/1/3.0
1921.6800.5080 3
so-5/0/0.0
1921.6800.5080 3

State
Hold (secs) SNPA
Initializing
26
Initializing
24
Initializing
21

clear isis adjacency all

422

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

clear isis database


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description

Options

Syntax on page 423


Syntax (EX Series Switches and QFX Series) on page 423
clear isis database
<entries>
<instance instance-name>
<logical-system (all | logical-system-name)>
clear isis database
<entries>
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Remove the entries from the IS-IS link-state database, which contains prefixes and
topology information.
noneRemove all entries from the IS-IS link-state database for all routing instances.
entries(Optional) Name of the database entry.
instance instance-name(Optional) Clear all entries for the specified routing instance.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

clear

show isis database on page 475

clear isis database on page 423


See show isis database for an explanation of output fields.

Sample Output
clear isis database
The following sample output displays IS-IS link-state database information before and
after the clear isis database command is entered:
user@host> show isis database
IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime (secs)
crater.00-00
0x12
0x84dd
1139
1 LSPs
IS-IS level 2 link-state database:

Copyright 2015, Juniper Networks, Inc.

423

IS-IS Feature Guide for Routing Devices

LSP ID
crater.00-00
badlands.00-00
carlsbad.00-00
ranier.00-00
1921.6800.5066.00-00
1921.6800.5067.00-00
6 LSPs

Sequence Checksum Lifetime (secs)


0x19
0xe92c
1134
0x16
0x1454
985
0x33
0x220b
1015
0x2e
0xfc31
1007
0x11
0x7313
566
0x14
0xd9d4
939

user@host> clear isis database

user@host> show isis database


IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime (secs)
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime (secs)

424

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

clear isis overload


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description

Syntax on page 425


Syntax (EX Series Switches and QFX Series) on page 425
clear isis overload
<instance instance-name>
<logical-system (all | logical-system-name)>
clear isis overload
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Reset the IS-IS dynamic overload bit. This command can appear to not work, continuing
to display overload after execution. The bit is reset only if the root cause is corrected by
configuration remotely or locally.
When other routers detect that the overload bit is set, they do not use this routing device
for transit traffic, but they do use it for packets destined to the overloaded routing devices
directly connected networks and IP prefixes.

Options

noneReset the IS-IS dynamic overload bit.


instance instance-name(Optional) Reset the IS-IS dynamic overload bit for the specified

routing instance.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

clear

show isis database on page 475

clear isis overload on page 425


See show isis database for an explanation of output fields.

Sample Output
clear isis overload
The following sample output displays IS-IS database information before and after the
clear isis overload command is entered:
user@host> show isis database

Copyright 2015, Juniper Networks, Inc.

425

IS-IS Feature Guide for Routing Devices

IS-IS level 1 link-state database:


LSP ID
Sequence Checksum Lifetime Attributes
pro3-c.00-00
0x4
0x10db
1185 L1 L2 Overload
1 LSPs
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
pro3-c.00-00
0x5
0x429f
1185 L1 L2 Overload

pro2-a.00-00
pro2-a.02-00
3 LSPs

0x91e
0x1

0x2589
0xcbc

874 L1 L2
874 L1 L2

user@host> clear isis overload

user@host> show isis database


IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
pro3-c.00-00
0xa
0x429e
1183 L1 L2
1 LSPs
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
pro3-c.00-00
0xc
0x9c39
1183 L1 L2
pro2-a.00-00
0x91e
0x2589
783 L1 L2
pro2-a.02-00
0x1
0xcbc
783 L1 L2
3 LSPs

426

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

clear isis statistics


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description
Options

Syntax on page 427


Syntax (EX Series Switches and QFX Series) on page 427
clear isis statistics
<instance instance-name>
<logical-system (all | logical-system-name)>
clear isis statistics
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Set statistics about IS-IS traffic to zero.
noneSet IS-IS traffic statistics to zero for all routing instances.
instance instance-name(Optional) Set IS-IS traffic statistics to zero for the specified

routing instance only.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

view

show isis statistics on page 506

clear isis statistics on page 427


See show isis statistics for an explanation of output fields.

Sample Output
clear isis statistics
The following sample output displays IS-IS statistics before and after the
clear isis statistics command is entered:
user@host> show isis statistics
IS-IS statistics for merino:
PDU type
LSP
IIH
CSNP
PSNP
Unknown

Copyright 2015, Juniper Networks, Inc.

Received
12793
116751
203956
7356
0

Processed
12793
116751
203956
7350
0

Drops
0
0
0
6
0

Sent
8666
118834
204080
8635
0

Rexmit
719
0
0
0
0

427

IS-IS Feature Guide for Routing Devices

Totals

340856

340850

340215

719

Sent
0
3
4
0
0
7

Rexmit
0
0
0
0
0
0

Total packets received: 340856 Sent: 340934


SNP queue length:
LSP queue length:
SPF runs:
Fragments rebuilt:
LSP regenerations:
Purges initiated:

0 Drops:
0 Drops:

0
0

1064
1087
436
0

user@host> clear isis statistics

user@host> show isis statistics


IS-IS statistics for merino:
PDU type
LSP
IIH
CSNP
PSNP
Unknown
Totals

Received
0
3
2
0
0
5

Processed
0
3
2
0
0
5

Drops
0
0
0
0
0
0

Total packets received: 5 Sent: 7

428

SNP queue length:


LSP queue length:

0 Drops:
0 Drops:

SPF runs:
Fragments rebuilt:
LSP regenerations:
Purges initiated:

0
0
0
0

0
0

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

ping clns
Syntax

Release Information
Description

Options

ping clns host


<brief>
<count requests>
<detail>
<do-not-fragment>
<interval seconds>
<logical-system logical-system-name>
<no-resolve>
<pattern string>
<rapid>
<routing-instance routing-instance-name>
<size bytes>
<source source-address>
<ttl value>
<verbose>
<wait seconds>

Command introduced before Junos OS Release 7.4.


Check the reachability of a remote Connectionless Network Service (CLNS) node. Type
Ctrl+c to interrupt a ping clns command.
hostIP address or hostname of the remote system to ping.
brief(Optional) Display brief information.
count requests(Optional) Number of ping requests to send. The range of values is 1

through 2,000,000,000. The default is an unlimited number of requests.


detail(Optional) Include in the output the interface on which the ping reply was received.
do-not-fragment(Optional) Set the do-not-fragment (DF) bit in the IP header of the

ping packets.
interval seconds(Optional) How often to send ping requests. The range of values, in

seconds, is 1 through infinity. The default value is 1.


logical-system logical-system-name(Optional) Run the command from the specified

logical system.
no-resolve(Optional) Do not attempt to determine the hostname that corresponds to

the IP address.
pattern string(Optional) Specify a hexadecimal fill pattern to include in the ping packet.
rapid(Optional) Send ping requests rapidly. The results are reported in a single message,

not in individual messages for each ping request. By default, five ping requests are
sent before the results are reported. To change the number of request, include the
count option.

Copyright 2015, Juniper Networks, Inc.

429

IS-IS Feature Guide for Routing Devices

routing-instance routing-instance-name (Optional) Name of the routing instance for the

ping attempt.
size bytes(Optional) Size of ping request packets. The range of values, in bytes, is 0

through 65,468. The default value is 56, which is effectively 64 bytes because 8
bytes of ICMP header data are added to the packet.
source source-address(Optional) IP address of the outgoing interface. This address is

sent in the IP source address field of the ping request. If this option is not specified,
the default address is usually the loopback interface.
ttl value(Optional) Time-to-live (TTL) value to include in the ping request (IPv6). The

range of values is 0 through 255.


verbose(Optional) Display detailed output.
wait seconds(Optional) Maximum wait time, in seconds, after the final packet is sent.

If this option is not specified, the default delay is 10 seconds. If this option is used
without the count option, a default count of 5 packets is used.
Required Privilege
Level
List of Sample Output
Output Fields

network

ping clns on page 430


When you enter this command, you are provided feedback on the status of your request.
An exclamation point (!) indicates that an echo reply was received. A period (.) indicates
that an echo reply was not received within the timeout period. An x indicates that an
echo reply was received with an error code. Packets with an error code are not counted
in the received packets count. They are accounted for separately.

Sample Output
ping clns
user@host> ping clns 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00
PING 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00
(47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00): 55 data bytes
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=0 ttl=30
time=15.051 ms
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=1 ttl=30
time=10.370 ms
64 bytes from 47.0005.9000.f800.0000.0108.0001.1921.6812.4058.00: seq=2 ttl=30
time=10.367 ms
--- ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 10.367/11.929/15.051/2.207 ms

430

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

restart
List of Syntax

Syntax on page 431


Syntax (ACX Series Routers) on page 431
Syntax (EX Series Switches) on page 431
Syntax (MX Series Routers) on page 432
Syntax (QFX Series) on page 432
Syntax (Routing Matrix) on page 432
Syntax (TX Matrix Routers) on page 432
Syntax (TX Matrix Plus Routers) on page 433

Syntax

<adaptive-services |ancpd-service | application-identification |audit-process |


auto-configuration |captive-portal-content-delivery |ce-l2tp-service |chassis-control |
class-of-service |clksyncd-service |database-replication|datapath-trace-service
|dhcp-service | diameter-service | disk-monitoring | dynamic-flow-capture |
ecc-error-logging | ethernet-connectivity-fault-management
|ethernet-link-fault-management |event-processing | firewall
|general-authentication-service | gracefully | iccp-service |idp-policy | immediately
|interface-control | ipsec-key-management | kernel-replication | l2-learning | l2cpd-service
| l2tp-service | l2tp-universal-edge | lacp | license-service |link-management
|local-policy-decision-function |mac-validation |mib-process | mountd-service
|mpls-traceroute |mspd | multicast-snooping |named-service | nfsd-service |
packet-triggered-subscribers |peer-selection-service |pgm | pic-services-logging | pki-service
|ppp | ppp-service |pppoe | protected-system-domain-service |
redundancy-interface-process | remote-operations | root-system-domain-service | routing
<logical-system logical-system-name> | sampling | sbc-configuration-process | sdk-service
|service-deployment | services | snmp |soft |static-subscribers |statistics-service|
subscriber-management | subscriber-management-helper | tunnel-oamd |usb-control|
vrrp |web-management>
<gracefully | immediately | soft>

Syntax (ACX Series


Routers)

restart
<adaptive-services |audit-process | auto-configuration | autoinstallation |chassis-control |
class-of-service |clksyncd-service |database-replication| dhcp-service | diameter-service
| disk-monitoring | dynamic-flow-capture | ethernet-connectivity-fault-management
|ethernet-link-fault-management |event-processing | firewall
|general-authentication-service | gracefully | immediately |interface-control |
ipsec-key-management | l2-learning | lacp |link-management |mib-process | mountd-service
|mpls-traceroute |mspd | named-service | nfsd-service | pgm | pki-service |ppp | pppoe |
redundancy-interface-process | remote-operations | routing | sampling | sdk-service
|secure-neighbor-discovery | service-deployment | services | snmp |soft |statistics-service|
subscriber-management | subscriber-management-helper | tunnel-oamd | vrrp>

Syntax (EX Series


Switches)

restart
<autoinstallation | chassis-control | class-of-service | database-replication | dhcp |
dhcp-service | diameter-service | dot1x-protocol | ethernet-link-fault-management |
ethernet-switching | event-processing | firewall | general-authentication-service |
interface-control | kernel-replication | l2-learning | lacp | license-service | link-management
| lldpd-service | mib-process | mountd-service | multicast-snooping | pgm |
redundancy-interface-process | remote-operations | routing | secure-neighbor-discovery
| service-deployment | sflow-service | snmp | vrrp | web-management>

Copyright 2015, Juniper Networks, Inc.

431

IS-IS Feature Guide for Routing Devices

Syntax (MX Series


Routers)

restart
<adaptive-services | ancpd-service |application-identification|audit-process |
auto-configuration |captive-portal-content-delivery |ce-l2tp-service |chassis-control |
class-of-service |clksyncd-service |database-replication| datapath-trace-service
|dhcp-service | diameter-service | disk-monitoring | dynamic-flow-capture |
ecc-error-logging | ethernet-connectivity-fault-management
|ethernet-link-fault-management |event-processing | firewall |
general-authentication-service | gracefully |iccp-service |idp-policy |immediately
|interface-control | ipsec-key-management | kernel-replication | l2-learning |l2cpd-service
|l2tp-service | l2tp-universal-edge | lacp | license-service |link-management
|local-policy-decision-function |mac-validation |mib-process | mountd-service
|mpls-traceroute |mspd | multicast-snooping |named-service | nfsd-service |
packet-triggered-subscribers |peer-selection-service | pgm | pic-services-logging |
pki-service |ppp | ppp-service |pppoe | protected-system-domain-service |
redundancy-interface-process | remote-operations |root-system-domain-service | routing
|routing <logical-system logical-system-name> | sampling | sbc-configuration-process |
sdk-service |service-deployment |services | snmp |soft |static-subscribers |statistics-service|
subscriber-management | subscriber-management-helper | tunnel-oamd | usb-control|
vrrp |web-management>
<all-members>
<gracefully | immediately | soft>
<local>
<member member-id>

Syntax (QFX Series)

restart
<adaptive-services | audit-process | chassis-control | class-of-service | dialer-services |
diameter-service | dlsw | ethernet-connectivity | event-processing | fibre-channel | firewall
| general-authentication-service | igmp-host-services | interface-control |
ipsec-key-management | isdn-signaling | l2ald | l2-learning | l2tp-service | mib-process |
named-service | network-access-service | nstrace-process | pgm | ppp | pppoe |
redundancy-interface-process | remote-operations |logical-system-name> | routing |
sampling |secure-neighbor-discovery | service-deployment | snmp | usb-control |
web-management>
<gracefully | immediately | soft>

Syntax (Routing
Matrix)

Syntax (TX Matrix


Routers)

432

restart
<adaptive-services | audit-process | chassis-control | class-of-service | disk-monitoring |
dynamic-flow-capture | ecc-error-logging | event-processing | firewall | interface-control
| ipsec-key-management | kernel-replication | l2-learning | l2tp-service | lacp |
link-management | mib-process | pgm | pic-services-logging | ppp | pppoe |
redundancy-interface-process | remote-operations | routing <logical-system
logical-system-name> | sampling | service-deployment | snmp>
<all | all-lcc | lcc number>
<gracefully | immediately | soft>
restart
<adaptive-services | audit-process | chassis-control | class-of-service | dhcp-service |
diameter-service | disk-monitoring | dynamic-flow-capture | ecc-error-logging |
event-processing | firewall | interface-control | ipsec-key-management | kernel-replication
| l2-learning | l2tp-service | lacp | link-management | mib-process |pgm | pic-services-logging
| ppp | pppoe | redundancy-interface-process | remote-operations | routing <logical-system
logical-system-name> | sampling | service-deployment | snmp| statistics-service>
<all-chassis | all-lcc | lcc number | scc>
<gracefully | immediately | soft>

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Syntax (TX Matrix Plus


Routers)

Release Information

Description

restart
<adaptive-services | audit-process | chassis-control | class-of-service | dhcp-service |
diameter-service | disk-monitoring | dynamic-flow-capture | ecc-error-logging |
event-processing | firewall | interface-control | ipsec-key-management | kernel-replication
| l2-learning | l2tp-service | lacp | link-management | mib-process | pgm |
pic-services-logging | ppp | pppoe | redundancy-interface-process | remote-operations |
routing <logical-system logical-system-name> | sampling | service-deployment | snmp|
statistics-service>
<all-chassis | all-lcc | all-sfc | lcc number | sfc number>
<gracefully | immediately | soft>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Command introduced in Junos OS Release 12.2 for ACX Series routers.
Options added:

dynamic-flow-capture in Junos OS Release 7.4.

dlsw in Junos OS Release 7.5.

event-processing in Junos OS Release 7.5.

ppp in Junos OS Release 7.5.

l2ald in Junos OS Release 8.0.

link-management in Release 8.0.

sbc-configuration-process in Junos OS Release 9.5.

sfc and all-sfc for the TX Matrix Router in Junos OS Release 9.6.

Restart a Junos OS process.

CAUTION: Never restart a software process unless instructed to do so by a


customer support engineer. A restart might cause the router or switch to drop
calls and interrupt transmission, resulting in possible loss of data.

Options

noneSame as gracefully.
adaptive-services(Optional) Restart the configuration management process that

manages the configuration for stateful firewall, Network Address Translation (NAT),
intrusion detection services (IDS), and IP Security (IPsec) services on the Adaptive
Services PIC.
all-chassis(TX Matrix and TX Matrix Plus routers only) (Optional) Restart the software

process on all chassis.


all-lcc(TX Matrix and TX Matrix Plus routers only) (Optional) For a TX Matrix router,

restart the software process on all T640 routers connected to the TX Matrix router.

Copyright 2015, Juniper Networks, Inc.

433

IS-IS Feature Guide for Routing Devices

For a TX Matrix Plus router, restart the software process on all T1600 routers
connected to the TX Matrix Plus router.
all-members(MX Series routers only) (Optional) Restart the software process for all

members of the Virtual Chassis configuration.


all-sfc(TX Matrix Plus routers only) (Optional) For a TX Matrix Plus router, restart the

software processes for the TX Matrix Plus router (or switch-fabric chassis).
ancpd-service(Optional) Restart the Access Node Control Protocol (ANCP) process,

which works with a special Internet Group Management Protocol (IGMP) session to
collect outgoing interface mapping events in a scalable manner.
application-identification(Optional) Restart the process that identifies an application

using intrusion detection and prevention (IDP) to allow or deny traffic based on
applications running on standard or nonstandard ports.
audit-process(Optional) Restart the RADIUS accounting process that gathers statistical

data that can be used for general network monitoring, analyzing, and tracking usage
patterns, for billing a user based on the amount of time or type of services accessed.
auto-configuration(Optional) Restart the Interface Auto-Configuration process.
autoinstallation(EX Series switches only) (Optional) Restart the autoinstallation

process.
captive-portal-content-delivery(Optional) Restart the HTTP redirect service by specifying

the location to which a subscriber's initial Web browser session is redirected, enabling
initial provisioning and service selection for the subscriber.
ce-l2tp-service(M10, M10i, M7i, and MX Series routers only) (Optional) Restart the

Universal Edge Layer 2 Tunneling Protocol (L2TP) process, which establishes L2TP
tunnels and Point-to-Point Protocol (PPP) sessions through L2TP tunnels.
chassis-control(Optional) Restart the chassis management process.
class-of-service(Optional) Restart the class-of-service (CoS) process, which controls

the router's or switchs CoS configuration.


clksyncd-service(Optional) Restart the external clock synchronization process, which

uses synchronous Ethernet (SyncE).


database-replication(EX Series switches and MX Series routers only) (Optional) Restart

the database replication process.


datapath-trace-service(Optional) Restart the packet path tracing process.
dhcp(EX Series switches only) (Optional) Restart the software process for a Dynamic

Host Configuration Protocol (DHCP) server. A DHCP server allocates network IP


addresses and delivers configuration settings to client hosts without user intervention.
dhcp-service(Optional) Restart the Dynamic Host Configuration Protocol process.

434

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

dialer-services(EX Series switches only) (Optional) Restart the ISDN dial-out process.
diameter-service(Optional) Restart the diameter process.
disk-monitoring(Optional) Restart disk monitoring, which checks the health of the hard

disk drive on the Routing Engine.


dlsw(QFX Series only) (Optional) Restart the data link switching (DLSw) service.
dot1x-protocol(EX Series switches only) (Optional) Restart the port-based network

access control process.


dynamic-flow-capture(Optional) Restart the dynamic flow capture (DFC) process,

which controls DFC configurations on Monitoring Services III PICs.


ecc-error-logging(Optional) Restart the error checking and correction (ECC) process,

which logs ECC parity errors in memory on the Routing Engine.


ethernet-connectivity-fault-management(Optional) Restart the process that provides

IEEE 802.1ag Operation, Administration, and Management (OAM) connectivity fault


management (CFM) database information for CFM maintenance association end
points (MEPs) in a CFM session.
ethernet-link-fault-management(EX Series switches and MX Series routers only)

(Optional) Restart the process that provides the OAM link fault management (LFM)
information for Ethernet interfaces.
ethernet-switching(EX Series switches only) (Optional) Restart the Ethernet switching

process.
event-processing(Optional) Restart the event process (eventd).
fibre-channel(QFX Series only) (Optional) Restart the Fibre Channel process.
firewall(Optional) Restart the firewall management process, which manages the

firewall configuration and enables accepting or rejecting packets that are transiting
an interface on a router or switch.
general-authentication-service(EX Series switches and MX Series routers only)

(Optional) Restart the general authentication process.


gracefully(Optional) Restart the software process.
iccp-service(Optional) Restart the Inter-Chassis Communication Protocol (ICCP)

process.
idp-policy(Optional) Restart the intrusion detection and prevention (IDP) protocol

process.
immediately(Optional) Immediately restart the software process.
interface-control(Optional) Restart the interface process, which controls the router's

or switchs physical interface devices and logical interfaces.

Copyright 2015, Juniper Networks, Inc.

435

IS-IS Feature Guide for Routing Devices

ipsec-key-management(Optional) Restart the IPsec key management process.


isdn-signaling(QFX Series only) (Optional) Restart the ISDN signaling process, which

initiates ISDN connections.


kernel-replication(Optional) Restart the kernel replication process, which replicates

the state of the backup Routing Engine when graceful Routing Engine switchover
(GRES) is configured.
l2-learning(Optional) Restart the Layer 2 address flooding and learning process.
l2cpd-service(Optional) Restart the Layer 2 Control Protocol process, which enables

features such as Layer 2 protocol tunneling and nonstop bridging.


l2tp-service (M10, M10i, M7i, and MX Series routers only) (Optional) Restart the Layer 2

Tunneling Protocol (L2TP) process, which sets up client services for establishing
Point-to-Point Protocol (PPP) tunnels across a network and negotiating Multilink
PPP if it is implemented.
l2tp-universal-edge(MX Series routers only) (Optional) Restart the L2TP process, which

establishes L2TP tunnels and PPP sessions through L2TP tunnels.


lacp(Optional) Restart the Link Aggregation Control Protocol (LACP) process. LACP

provides a standardized means for exchanging information between partner systems


on a link to allow their link aggregation control instances to reach agreement on the
identity of the LAG to which the link belongs, and then to move the link to that LAG,
and to enable the transmission and reception processes for the link to function in
an orderly manner.
lcc number(TX Matrix and TX Matrix Plus routers only) (Optional) For a TX Matrix router,

restart the software process for a specific T640 router that is connected to the TX
Matrix router. For a TX Matrix Plus router, restart the software process for a specific
router that is connected to the TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:

0 through 3, when T640 routers are connected to a TX Matrix router in a routing


matrix.

0 through 3, when T1600 routers are connected to a TX Matrix Plus router in a


routing matrix.

0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.

0, 2, 4, or 6, when T4000 routers are connected to a TX Matrix Plus router with


3D SIBs in a routing matrix.

license-service(EX Series switches only) (Optional) Restart the feature license

management process.
link-management (TX Matrix and TX Matrix Plus routers and EX Series switches only)

(Optional) Restart the Link Management Protocol (LMP) process, which establishes
and maintains LMP control channels.

436

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

lldpd-service(EX Series switches only) (Optional) Restart the Link Layer Discovery

Protocol (LLDP) process.


local(MX Series routers only) (Optional) Restart the software process for the local

Virtual Chassis member.


local-policy-decision-function (Optional) Restart the process for the Local Policy

Decision Function, which regulates collection of statistics related to applications


and application groups and tracking of information about dynamic subscribers and
static interfaces.
mac-validation (Optional) Restart the Media Access Control (MAC) validation process,

which configures MAC address validation for subscriber interfaces created on demux
interfaces in dynamic profiles on MX Series routers.
member member-id(MX Series routers only) (Optional) Restart the software process

for a specific member of the Virtual Chassis configuration. Replace member-id with
a value of 0 or 1.
mib-process(Optional) Restart the Management Information Base (MIB) version II

process, which provides the router's MIB II agent.


mountd-service(EX Series switches and MX Series routers only) (Optional) Restart the

service for NFS mount requests.


mpls-traceroute(Optional) Restart the MPLS Periodic Traceroute process.
mspd(Optional) Restart the Multiservice process.
multicast-snooping(EX Series switches and MX Series routers only) (Optional) Restart

the multicast snooping process, which makes Layer 2 devices, such as VLAN switches,
aware of Layer 3 information, such as the media access control (MAC) addresses
of members of a multicast group.
named-service(Optional) Restart the DNS Server process, which is used by a router or

a switch to resolve hostnames into addresses.


network-access-service(QFX Series only) (Optional) Restart the network access process,

which provides the router's Challenge Handshake Authentication Protocol (CHAP)


authentication service.
nfsd-service(Optional) Restart the Remote NFS Server process, which provides remote

file access for applications that need NFS-based transport.


packet-triggered-subscribers(Optional) Restart the packet-triggered subscribers and

policy control (PTSP) process, which allows the application of policies to dynamic
subscribers that are controlled by a subscriber termination device.
peer-selection-service(Optional) Restart the Peer Selection Service process.
pgm(Optional) Restart the process that implements the Pragmatic General Multicast

(PGM) protocol for assisting in the reliable delivery of multicast packets.

Copyright 2015, Juniper Networks, Inc.

437

IS-IS Feature Guide for Routing Devices

pic-services-logging(Optional) Restart the logging process for some PICs. With this

process, also known as fsad (the file system access daemon), PICs send special
logging information to the Routing Engine for archiving on the hard disk.
pki-service(Optional) Restart the PKI Service process.
ppp(Optional) Restart the Point-to-Point Protocol (PPP) process, which is the

encapsulation protocol process for transporting IP traffic across point-to-point links.


ppp-service(Optional) Restart the Universal Edge PPP process, which is the

encapsulation protocol process for transporting IP traffic across Universal Edge


routers.
pppoe(Optional) Restart the Point-to-Point Protocol over Ethernet (PPPoE) process,

which combines PPP that typically runs over broadband connections with the
Ethernet link-layer protocol that allows users to connect to a network of hosts over
a bridge or access concentrator.
protected-system-domain-service(Optional) Restart the Protected System Domain

(PSD) process.
redundancy-interface-process(Optional) Restart the ASP redundancy process.
remote-operations(Optional) Restart the remote operations process, which provides

the ping and traceroute MIBs.


root-system-domain-service(Optional) Restart the Root System Domain (RSD) service.
routing(ACX Series routers, QFX Series, EX Series switches, and MX Series routers only)

(Optional) Restart the routing protocol process.


routing <logical-system logical-system-name>(Optional) Restart the routing protocol

process, which controls the routing protocols that run on the router or switch and
maintains the routing tables. Optionally, restart the routing protocol process for the
specified logical system only.
sampling(Optional) Restart the sampling process, which performs packet sampling

based on particular input interfaces and various fields in the packet header.
sbc-configuration-process(Optional) Restart the session border controller (SBC) process

of the border signaling gateway (BSG).


scc(TX Matrix routers only) (Optional) Restart the software process on the TX Matrix

router (or switch-card chassis).


sdk-service(Optional) Restart the SDK Service process, which runs on the Routing

Engine and is responsible for communications between the SDK application and
Junos OS. Although the SDK Service process is present on the router, it is turned off
by default.
secure-neighbor-discovery(QFX Series, EX Series switches, and MX Series routers only)

(Optional) Restart the secure Neighbor Discovery Protocol (NDP) process, which
provides support for protecting NDP messages.

438

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

sfc number(TX Matrix Plus routers only) (Optional) Restart the software process on

the TX Matrix Plus router (or switch-fabric chassis). Replace number with 0.
service-deployment(Optional) Restart the service deployment process, which enables

Junos OS to work with the Session and Resource Control (SRC) software.
services(Optional) Restart a service.
sflow-service(EX Series switches only) (Optional) Restart the flow sampling (sFlow

technology) process.
snmp(Optional) Restart the SNMP process, which enables the monitoring of network

devices from a central location and provides the router's or switchs SNMP master
agent.
soft(Optional) Reread and reactivate the configuration without completely restarting

the software processes. For example, BGP peers stay up and the routing table stays
constant. Omitting this option results in a graceful restart of the software process.
static-subscribers(Optional) Restart the static subscribers process, which associates

subscribers with statically configured interfaces and provides dynamic service


activation and activation for these subscribers.
statistics-service(Optional) Restart the process that manages the Packet Forwarding

Engine statistics.
subscriber-management(Optional) Restart the Subscriber Management process.
subscriber-management-helper(Optional) Restart the Subscriber Management Helper

process.
tunnel-oamd(Optional) Restart the Tunnel OAM process, which enables the Operations,

Administration, and Maintenance of Layer 2 tunneled networks. Layer 2 protocol


tunneling (L2PT) allows service providers to send Layer 2 PDUs across the providers
cloud and deliver them to Juniper Networks EX Series Ethernet Switches that are
not part of the local broadcast domain.
usb-control(MX Series routers only) (Optional) Restart the USB control process.
vrrp(ACX Series routers, EX Series switches, and MX Series routers only) (Optional)

Restart the Virtual Router Redundancy Protocol (VRRP) process, which enables
hosts on a LAN to make use of redundant routing platforms on that LAN without
requiring more than the static configuration of a single default route on the hosts.
web-management(QFX Series, EX Series switches, and MX Series routers only)

(Optional) Restart the Web management process.


Required Privilege
Level
Related
Documentation

reset

Overview of Junos OS CLI Operational Mode Commands

Copyright 2015, Juniper Networks, Inc.

439

IS-IS Feature Guide for Routing Devices

List of Sample Output


Output Fields

restart interfaces on page 440


When you enter this command, you are provided feedback on the status of your request.

Sample Output
restart interfaces
user@host> restart interfaces
interfaces process terminated
interfaces process restarted

440

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show bfd session


List of Syntax

Syntax on page 441


Syntax (EX Series Switch and QFX Series) on page 441

Syntax

show bfd session


<brief | detail | extensive | summary>
<address address>
<client rsvp-oam (brief | detail | extensive | summary) | vpls-oam (brief | detail | extensive |
instance instance-name | summary)>
<discriminator discriminator>
<logical-system (all | logical-system-name)>
<prefix address>

Syntax (EX Series


Switch and QFX
Series)

show bfd session


<brief | detail | extensive | summary>
<address address>
<client rsvp-oam (brief | detail | extensive | summary) | vpls-oam (brief | detail | extensive |
instance instance-name | summary)>
<discriminator discriminator>
<prefix address>

Release Information

Description
Options

Command introduced before Junos OS Release 7.4.


Options discriminator and address introduced in Junos OS Release 8.2.
Option prefix introduced in Junos OS Release 9.0.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Option client introduced in Junos OS Release 12.3R3.
Display information about active Bidirectional Forwarding Detection (BFD) sessions.
none(Same as brief) Display information about active BFD sessions.
brief | detail | extensive | summary(Optional) Display the specified level of output.
address address(Optional) Display information about the BFD session for the specified

neighbor address.
client rsvp-oam
(brief | detail | extensive | summary)
| vpls-oam
(brief | detail | extensive | instance instance-name | summary)(Optional) Display

information about RSVP-OAM or VPLS-OAM BFD sessions in the specified level of


output. For VPLS-OAM, display the specified level of output or display information
about all of the BFD sessions for the specified VPLS routing instance.
discriminator discriminator(Optional) Display information about the BFD session using

the specified local discriminator.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.

Copyright 2015, Juniper Networks, Inc.

441

IS-IS Feature Guide for Routing Devices

prefix address(Optional) Display information about all of the BFD sessions for the

specified LDP forwarding equivalence class (FEC).


Required Privilege
Level
Related
Documentation

List of Sample Output

Output Fields

view

clear bfd session on page 420

Understanding BFD for Static Routes for Faster Network Failure Detection

Example: Configuring BFD for Static Routes for Faster Network Failure Detection

Understanding BFD for OSPF

Example: Configuring BFD for OSPF

Understanding BFD for BGP

Example: Configuring BFD on Internal BGP Peer Sessions

Understanding Bidirectional Forwarding Detection Authentication for PIM

Configuring BFD for PIM

Understanding BFD for IS-IS on page 109

show bfd session on page 446


show bfd session brief on page 446
show bfd session detail on page 446
show bfd session detail (with Authentication) on page 446
show bfd session address extensive on page 447
show bfd session client rsvp-oam on page 447
show bfd session client vpls-oam summary on page 447
show bfd session client vpls-oam instance instance-name on page 447
show bfd session extensive on page 447
show bfd session extensive (with Authentication) on page 448
show bfd session summary on page 448
Table 12 on page 442 describes the output fields for the show bfd session command. Output
fields are listed in the approximate order in which they appear.

Table 12: show bfd session Output Fields


Field Name

Field Description

Level of Output

Address

Address on which the BFD session is active.

brief detail extensive

none
State

State of the BFD session: Up, Down, Init (initializing), or Failing.

brief detail extensive

none
Interface

Interface on which the BFD session is active.

brief detail extensive

none
Detect Time

Negotiated time interval, in seconds, used to detect BFD control packets.

brief detail extensive

none

442

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 12: show bfd session Output Fields (continued)


Field Name

Field Description

Level of Output

Transmit Interval

Time interval, in seconds, used by the transmitting system to send BFD control
packets.

brief detail extensive

Multiplier

Negotiated multiplier by which the time interval is multiplied to determine the


detection time for the transmitting system.

detail extensive

Session up time

How long a BFD session has been established.

detail extensive

Client

Protocol for which the BFD session is active: ISIS, OSPF, DHCP, or Static.

detail extensive

TX interval

Time interval, in seconds, used by the host system to transmit BFD control
packets.

brief detail extensive

Time interval, in seconds, used by the host system to receive BFD


control packets.

brief detail extensive

Authenticate

Indicates that BFD authentication is configured.

detail extensive

keychain

Name of the security authentication keychain being used by a specific client.

extensive

RX interval

none

none

none

BFD authentication information for a client is provided in a single line and


includes the keychain, algo, and mode parameters. Multiple clients can be
configured on a BFD session.
algo

BFD authentication algorithm being used for a specific client: keyed-md5,


keyed-sha-1, meticulous-keyed-md5, meticulous-keyed-sha-1, or simple-password.

extensive

BFD authentication information for a client is provided in a single line and


includes the keychain, algo, and mode parameters. Multiple clients can be
configured on a BFD session.
mode

Level of BFD authentication enforcement being used by a specific client: strict


or loose. Strict enforcement indicates that authentication is configured at both
ends of the session (the default). Loose enforcement indicates that one end of
the session might not be authenticated.

extensive

BFD authentication information for a client is provided in a single line and


includes the keychain, algo, and mode parameters. Multiple clients can be
configured on a BFD session.
Local diagnostic

Local diagnostic information about failing BFD sessions.

detail extensive

Remote diagnostic

Remote diagnostic information about failing BFD sessions.

detail extensive

Remote state

Reports whether the remote system's BFD packets have been received and
whether the remote system is receiving transmitted control packets.

detail extensive

Version

BFD version: 0 or 1.

extensive

Copyright 2015, Juniper Networks, Inc.

443

IS-IS Feature Guide for Routing Devices

Table 12: show bfd session Output Fields (continued)


Field Name

Field Description

Level of Output

Replicated

The replicated flag appears when nonstop routing or graceful Routing Engine
switchover is configured and the BFD session has been replicated to the backup
Routing Engine.

detail extensive

Min async interval

Minimum amount of time, in seconds, between asynchronous control packet


transmissions across the BFD session.

extensive

Min slow interval

Minimum amount of time, in seconds, between synchronous control packet


transmissions across the BFD session.

extensive

Adaptive async TX
interval

Transmission interval being used because of adaptation.

extensive

RX interval

Minimum required receive interval.

extensive

Local min TX
interval

Minimum amount of time, in seconds, between control packet transmissions


on the local system.

extensive

Local min RX
interval

Minimum amount of time, in seconds, between control packet detections on


the local system.

extensive

Remote min TX
interval

Minimum amount of time, in seconds, between control packet transmissions


on the remote system.

extensive

Remote min TX
interval

Minimum amount of time, in seconds, between control packet detections on


the remote system.

extensive

Threshold
transmission
interval

Threshold for notification if the transmission interval increases.

extensive

Threshold for
detection time

Threshold for notification if the detection time increases.

extensive

Local discriminator

Authentication code used by the local system to identify that BFD session.

extensive

Remote
discriminator

Authentication code used by the remote system to identify that BFD session.

extensive

Echo mode

Information about the state of echo transmissions on the BFD session.

extensive

Prefix

LDP FEC address associated with the BFD session.

All levels

Egress, Destination

Displays the LDP FEC destination address. This field is displayed only on a router
at the egress of an LDP FEC, where the BFD session has an LDP Operation,
Administration, and Maintenance (OAM) client.

All levels

444

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 12: show bfd session Output Fields (continued)


Field Name

Field Description

Level of Output

Remote is
control-plane
independent

The BFD session on the remote peer is running on its Packet Forwarding Engine.
In this case, when the remote node undergoes a graceful restart, the local peer
can help the remote peer with the graceful restart.

extensive

The following BFD sessions are not distributed to the Packet Forwarding Engine:
tunnel-encapsulated sessions, and sessions over integrated routing and bridging
(IRB) interfaces.
Authentication

Summary status of BFD authentication:

extensive

statusenabled/active indicates authentication is configured and active.


enabled/inactive indicates authentication is configured but not active. This

only occurs when the remote end of the session does not support
authentication and loose checking is configured.

keychainName of the security authentication keychain associated with the

specified BFD session.

algoBFD authentication algorithm being used: keyed-md5, keyed-sha-1,


meticulous-keyed-md5, meticulous-keyed-sha-1, or simple-password.

modeLevel of BFD authentication enforcement: strict or loose. Strict

enforcement indicates authentication is configured at both ends of the session


(the default). Loose enforcement indicates that one end of the session might
not be authenticated.
This information is only shown if BFD authentication is configured.
Session ID

The BFD session ID number that represents the protection using MPLS fast
reroute (FRR) and loop-free alternate (LFA).

detail extensive

sessions

Total number of active BFD sessions.

All levels

clients

Total number of clients that are hosting active BFD sessions.

All levels

Cumulative
transmit rate

Total number of BFD control packets transmitted per second on all


active sessions.

All levels

Cumulative receive
rate

Total number of BFD control packets received per second on all active sessions.

All levels

Multi-hop,
min-recv-TTL

Minimum time to live (TTL) accepted if the session is configured for multihop.

extensive

route table

Route table used if the session is configured for multihop.

extensive

local address

Local address of the source used if the session is configured for multihop.

extensive

The source IP address for outgoing BFD packets from the egress side of an
MPLS BFD session is based on the outgoing interface IP address.

Copyright 2015, Juniper Networks, Inc.

445

IS-IS Feature Guide for Routing Devices

Sample Output
show bfd session
user@host> show bfd session
Address
10.9.1.33
10.9.1.29

State
Up
Up

Interface
so-7/1/0.0
ge-4/0/0.0

Detect Time
0.600
0.600

Transmit
Interval
0.200
0.200

Multiplier
3
3

2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

show bfd session brief


The output for the show bfd session brief command is identical to that for the show bfd
session command.
show bfd session detail
user@host> show bfd session detail
Transmit
Address
State
Interface
Detect Time Interval Multiplier
10.9.1.33
Up
so-7/1/0.0
0.600
0.200
3
Client OSPF, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:34
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Replicated
10.9.1.29
Up
ge-4/0/0.0
0.600
0.200
3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:29, previous down time 00:00:01
Local diagnostic NbrSignal, remote diagnostic AdminDown
Remote state Up, version 1
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

show bfd session detail (with Authentication)


user@host> show bfd session detail
Transmit
Address
State
Interface
Detect Time Interval Multiplier
10.9.1.33
Up
so-7/1/0.0
0.600
0.200
3
Client OSPF, TX interval 0.200, RX interval 0.200, multiplier 3, Authenticate
Session up time 3d 00:34
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Replicated
10.9.1.29
Up
ge-4/0/0.0
0.600
0.200
3
Client ISIS L2, TX interval 0.200, RX interval 0.200, multiplier 3
Session up time 3d 00:29, previous down time 00:00:01
Local diagnostic NbrSignal, remote diagnostic AdminDown
Remote state Up, version 1
2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

446

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show bfd session address extensive


user@host> show bfd session 10.255.245.212 extensive
Transmit
Address
State
Interface
Detect Time Interval Multiplier
10.255.245.212
Up
1.200
0.400
3
Client Static, TX interval 0.400, RX interval 0.400, multiplier 3
Session up time 00:17:03, previous down time 00:00:14
Local diagnostic CtlExpire, remote diagnostic NbrSignal
Remote state Up, version 1
Replicated
Min async interval 0.400, min slow interval 1.000
Adaptive async tx interval 0.400, rx interval 0.400
Local min tx interval 0.400, min rx interval 0.400, multiplier 3
Remote min tx interval 0.400, min rx interval 0.400, multiplier 3
Threshold transmission interval 0.000, Threshold for detection time 0.000
Local discriminator 6, remote discriminator 16
Echo mode disabled/inactive
Multi-hop, min-recv-TTL 255, route-table 0, local-address 10.255.245.205

1 sessions, 1 clients
Cumulative transmit rate 2.5 pps, cumulative receive rate 2.5 pps

show bfd session client rsvp-oam


user@host> show bfd session client rsvp-oam
Address

State

192.168.0.223

Up

Detect
Transmit
Time
Interval

Interface

540.000

180.000

Multiplier
3

1 Up sessions, 0 Down sessions


1 sessions, 1 clients
Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps

show bfd session client vpls-oam summary


user@host> show bfd session client vpls-oam summary
1 Up sessions, 1 Down sessions
2 sessions, 2 clients
Cumulative transmit rate 2.0 pps, cumulative receive rate 1.0 pps

show bfd session client vpls-oam instance instance-name


user@host> show bfd session client vpls-oam instance vpls
Detect
Transmit
Address
State
Interface
Time
Interval
127.0.0.1

Up

ae9.0

3.000

1.000

Multiplier
3

1 Up Sessions, 0 Down Sessions


1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps

show bfd session extensive


user@host> show bfd session extensive
Address
10.31.1.2

Copyright 2015, Juniper Networks, Inc.

State
Up

Detect
Transmit
Time
Interval
0.030
0.010

Interface
ge-2/1/8.0

Multiplier
3

447

IS-IS Feature Guide for Routing Devices

Client OSPF realm ospf-v2 Area 0.0.0.0, TX interval 0.010, RX interval 0.010
Session up time 00:10:13
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Replicated
Min async interval 0.010, min slow interval 1.000
Adaptive async TX interval 0.010, RX interval 0.010
Local min TX interval 0.010, minimum RX interval 0.010, multiplier 3
Remote min TX interval 0.010, min RX interval 0.010, multiplier 3
Local discriminator 12, remote discriminator 4
Echo mode disabled/inactive
Remote is control-plane independent
Session ID: 0x201
Micro-BFD Session
Detect
Transmit
Address
State
Interface
Time
Interval Multiplier
10.31.2.2
Up
ge-2/1/4.0
0.030
0.010
3
Client OSPF realm ospf-v2 Area 0.0.0.0, TX interval 0.010, RX interval 0.010
Session up time 00:10:14
Local diagnostic None, remote diagnostic NbrSignal
Remote state Up, version 1
Replicated
Min async interval 0.010, min slow interval 1.000
Adaptive async TX interval 0.010, RX interval 0.010
Local min TX interval 0.010, minimum RX interval 0.010, multiplier 3
Remote min TX interval 0.010, min RX interval 0.010, multiplier 3
Local discriminator 13, remote discriminator 5
Echo mode disabled/inactive
Remote is control-plane independent
Session ID: 0x202
2 sessions, 2 clients
Cumulative transmit rate 200.0 pps, cumulative receive rate 200.0 pps

show bfd session extensive (with Authentication)


user@host> show bfd session extensive
Detect
Transmit
Address
State
Interface
Time
Interval Multiplier
192.168.208.26
Up
so-1/0/0.0
2.400
0.800
10
Client Static, TX interval 0.600, RX interval 0.600, Authenticate
keychain bfd, algo keyed-md5, mode loose
Session up time 00:18:07
Local diagnostic None, remote diagnostic NbrSignal
Remote state Up, version 1
Replicated
Min async interval 0.600, min slow interval 1.000
Adaptive async TX interval 0.600, RX interval 0.600
Local min TX interval 0.600, minimum RX interval 0.600, multiplier 10
Remote min TX interval 0.800, min RX interval 0.800, multiplier 3
Local discriminator 2, remote discriminator 3
Echo mode disabled/inactive
Authentication enabled/active, keychain bfd, algo keyed-md5, mode loose

1 sessions, 1 clients
Cumulative transmit rate 1.2 pps, cumulative receive rate 1.2 pps

show bfd session summary


user@host> show bfd session summary

448

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

2 sessions, 2 clients
Cumulative transmit rate 10.0 pps, cumulative receive rate 10.0 pps

Copyright 2015, Juniper Networks, Inc.

449

IS-IS Feature Guide for Routing Devices

show isis adjacency


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)

Release Information

Description
Options

Syntax on page 450


Syntax (EX Series Switches and QFX Series) on page 450
show isis adjacency
<system-id>
<brief | detail | extensive>
<instance instance-name>
<logical-system (all | logical-system-name)>
show isis adjacency
<system-id>
<brief | detail | extensive>
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display information about IS-IS neighbors.
noneDisplay standard information about IS-IS neighbors for all routing instances.
system id(Optional) Display information about IS-IS neighbors for the specified

intermediate system.
brief | detail | extensive(Optional) Display standard information about IS-IS neighbors

with the specified level of output.


instance instance-name(Optional) Display information about IS-IS neighbors for the

specified routing instance.


logical-system (all | logical-system-name)(Optional) Display information about IS-IS

neighbors for all logical systems or for a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

450

view

clear isis adjacency on page 421

show isis adjacency on page 452


show isis adjacency brief on page 452
show isis adjacency detail on page 453
show isis adjacency extensive on page 453
Table 13 on page 451 describes the output fields for the show isis adjacency command.
Output fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 13: show isis adjacency Output Fields


Field Name

Field Description

Level of Output

Interface

Interface through which the neighbor is reachable.

All levels

System

System identifier (sysid), displayed as a name, if possible.

brief

L or Level

Level:

All levels

1Level 1 only

2Level 2 only

3Level 1 and Level 2

An exclamation point (!) preceding the level number indicates that the adjacency
is missing an IP address.
State

State of the adjacency: Up, Down, New, One-way, Initializing, or Rejected.

All levels

Hold (secs)

Remaining hold time of the adjacency.

brief

SNPA

Subnetwork point of attachment (MAC address of the next hop).

brief

Expires in

How long until the adjacency expires, in seconds.

detail

Priority

Priority to become the designated intermediate system.

detail extensive

Up/Down
transitions

Count of adjacency status changes from Up to Down or from Down to Up.

detail

Last transition

Time of the last Up/Down transition.

detail

Circuit type

Bit mask of levels on this interface: 1=Level 1 router; 2=Level 2 router; 3=both
Level 1 and Level 2 router.

detail

Speaks

Protocols supported by this neighbor.

detail extensive

MAC address

MAC address of the interface.

detail extensive

Topologies

Supported topologies.

detail extensive

Restart capable

Whether a neighbor is capable of graceful restart: Yes or No.

detail extensive

Adjacency
advertisement:
Advertise

This routing device has signaled to advertise this interface to its neighbors in
their link-state PDUs.

detail extensive

Adjacency
advertisement:
Suppress

This neighbor has signaled not to advertise the interface in the routing device's
outbound link-state PDUs.

detail extensive

IP addresses

IP address of this neighbor.

detail extensive

Copyright 2015, Juniper Networks, Inc.

451

IS-IS Feature Guide for Routing Devices

Table 13: show isis adjacency Output Fields (continued)


Field Name

Field Description

Level of Output

Transition log

List of recent transitions, including:

extensive

WhenTime at which an IS-IS adjacency transition occurred.

StateCurrent state of the IS-IS adjacency (up, down, or rejected).

UpAdjacency is up and operational.

DownAdjacency is down and not available.

RejectedAdjacency has been rejected.

EventType of transition that occurred.

SeenselfPossible routing loop has been detected.

Interface downIS-IS interface has gone down and is no longer available.

ErrorAdjacency error.

Down reasonReason that an IS-IS adjacency is down:

3-Way Handshake FailedConnection establishment failed.

Address MismatchAddress mismatch caused link failure.

Aged OutLink expired.

ISO Area MismatchIS-IS area mismatch caused link failure.

Bad HelloUnacceptable hello message caused link failure.

BFD Session DownBidirectional failure detection caused link failure.

Interface DisabledIS-IS interface is disabled.

Interface DownIS-IS interface is unavailable.

Interface Level DisabledIS-IS level is disabled.

Level ChangedIS-IS level has changed on the adjacency.

Level MismatchLevels on adjacency are not compatible.

MPLS LSP DownLabel-switched path (LSP) is unavailable.

MT Topology ChangedIS-IS topology has changed.

MT Topology MismatchIS-IS topology is mismatched.

Remote System ID ChangedAdjacency peer system ID changed.

Protocol ShutdownIS-IS protocol is disabled.

CLI CommandAdjacency brought down by user.

UnknownUnknown.

Sample Output
show isis adjacency
user@host> show isis adjacency
Interface
System
at-2/3/0.0
ranier

L State
3 Up

Hold (secs) SNPA


23

show isis adjacency brief


The output for the show isis adjacency brief command is identical to that for the show
isis adjacency command. For sample output, see show isis adjacency on page 452.

452

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis adjacency detail


user@host> show isis adjacency detail
ranier
Interface: at-2/3/0.0, Level: 3, State: Up, Expires in 21 secs
Priority: 0, Up/Down transitions: 1, Last transition: 00:01:09 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes
IP addresses: 11.1.1.2

show isis adjacency extensive


user@host> show isis adjacency extensive
ranier
Interface: at-2/3/0.0, Level: 3, State: Up, Expires in 22 secs
Priority: 0, Up/Down transitions: 1, Last transition: 00:01:16 ago
Circuit type: 3, Speaks: IP, IPv6
Topologies: Unicast
Restart capable: Yes
IP addresses: 11.1.1.2
Transition log:
When
State
Event
Down reason
Wed Nov 8 21:24:25
Up
Seenself

Copyright 2015, Juniper Networks, Inc.

453

IS-IS Feature Guide for Routing Devices

show isis adjacency holddown


Syntax

Release Information
Description

show isis adjacency holddown


<level>
<brief | detail | extensive>
<instance instance-name>
<logical-system (all | logical-system-name)>

Command introduced in Junos OS Release 15.1 for the MX Series and PTX Series.
Display holddown status and time when IS-IS adjacencies are being formed. Adjacency
holddown process takes place on an IS-IS level basis. When adjacency holdown is
enabled, IS-IS adjacencies are formed sequentially. There is a holddown time between
each adjacency and the process is completed when all IS-IS adjacencies are formed.
This holddown time might cause network instability.
This command is useful to verify whether the adjacency holddown is enabled and
facilitates troubleshooting when there are adjacency issues due to IS-IS adjacency
holddown .

Options

noneDisplay standard overview information about IS-IS adjacency holddown for all

routing instances.
brief | detail | extensive(Optional) Display standard information about IS-IS adjacency

holddown with the specified level of output.


instance instance-name(Optional) Display IS-IS adjacency holddown information for

the specified routing instance.


level(Optional) Display information about IS-IS neighbors for the specified IS-IS level.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output

454

view

show isis adjacency on page 450

show isis adjacency holddown on page 455


show isis adjacency holddown extensive on page 455

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Field
Level

Field Description

Output Fields IS-IS level:

status

1Level 1 information

2Level 2 information

IS-IS Adjacency holddown status:

activeIS-IS adjacency holddown is in process.

inactiveIS-IS adjacency holddown process is completed.

disabledIS-IS adjacency holddown is disabled.

when

The time stamp for the IS-IS adjacency holddown.

Event

seenselfIS-IS has changed the IS-IS adjacency holddown status.

status changeIS-IS adjacency holddown status has changed.

reason

The reason for change in the IS-IS adjacency holddown state.

Sample Output
show isis adjacency holddown
user@host> show isis adjacency holddown
Level
status
1
active
2
active

show isis adjacency holddown extensive


user@host> show isis adjacency holddown extensive
Level: 1
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Transition log:
When
State
Event
reason
Mon Jun 22 05:35:03
Active
Seenself
Tue Jun 23 02:13:30
Active
Seenself
Tue Jun 23 02:14:40
Inactive
Status change
holddown complete
Tue Jun 23 02:15:52
Active
Seenself
Level: 2
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Transition log:
When
State
Event
reason
Mon Jun 22 05:35:03
Active
Seenself
Tue Jun 23 02:13:30
Active
Seenself
Tue Jun 23 02:14:40
Inactive
Status change
holddown complete
Tue Jun 23 02:15:52
Active
Seenself

Copyright 2015, Juniper Networks, Inc.

455

IS-IS Feature Guide for Routing Devices

user@host> show isis adjacency holddown detail


Level: 1
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0
Level: 2
Adjacency holddown is active, Adjacency holddown reset is not completed
Holddown process has not started, Network might not be stable
Holddown Started 0 secs ago
First adjacency up since 0 secs
Total adjacency up count: 0

456

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis authentication


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description
Options

Syntax on page 457


Syntax (EX Series Switches and QFX Series) on page 457
show isis authentication
<instance instance-name>
<logical-system (all | logical-system-name)>
show isis authentication
<instance instance-name>

Command introduced in Junos OS Release 7.5.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Support for hitless authentication key rollover introduced in Junos OS Release 11.2.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display information about IS-IS authentication.
noneDisplay information about IS-IS authentication.
instance instance-name(Optional) Display IS-IS authentication for the specified routing

instance.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

view

show security keychain on page 666

show isis authentication on page 458


show isis authentication (With Hitless Authentication Key Rollover
Configured) on page 458
Table 14 on page 457 describes the output fields for the show isis authentication command.
Output fields are listed in the approximate order in which they appear.

Table 14: show isis authentication Output Fields


Field Name

Field Description

Interface

Interface name.

Level

IS-IS level.

Copyright 2015, Juniper Networks, Inc.

457

IS-IS Feature Guide for Routing Devices

Table 14: show isis authentication Output Fields (continued)


Field Name

Field Description

IIH Auth

IS-IS Hello (IIH) packet authentication type.


Displays the name of the active keychain if hitless authentication key rollover
is configured.

CSN Auth

Complete sequence number authentication type.

PSN Auth

Partial sequence number authentication type.

L1 LSP
Authentication

Layer 1 link-state PDU authentication type.

L2 LSP
Authentication

Layer 2 link-state PDU authentication type.

Sample Output
show isis authentication
user@host> show isis authentication
Interface
Level IIH Auth
at-2/3/0.0
1
Simple
2
MD5

CSN Auth
Simple
MD5

PSN Auth
Simple
MD5

L1 LSP Authentication: Simple


L2 LSP Authentication: MD5

show isis authentication (With Hitless Authentication Key Rollover Configured)


user@host> show isis authentication
Interface
Level IIH Auth CSN Auth
so-0/1/3.0
2
hakrhello MD5

PSN Auth
MD5

L2 LSP Authentication: MD5

458

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis backup coverage


Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description
Options

show isis backup coverage


<instance instance-name>
<logical-system (all | logical-system-name)>
show isis backup coverage
<instance instance-name>

Command introduced in Junos OS Release 9.5.


Command introduced in Junos OS Release 9.5 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display information about the level of backup coverage available.
noneDisplay information about the level of backup coverage available for all the nodes

and prefixes in the network.


instance instance-name(Optional) Display information about the level of backup

coverage for a specific IS-IS routing instance.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output


Output Fields

view

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

show isis backup label-switched-path on page 461

show isis backup coverage on page 460


Table 15 on page 459 lists the output fields for the show isis backup coverage command.
Output fields are listed in the approximate order in which they appear.

Table 15: show isis backup coverage Output Fields


Field Name

Field Description

Topology

Type of topology or address family: IPV4 Unicast or IPV6 Unicast.

Level

IS-IS level:

Node

Copyright 2015, Juniper Networks, Inc.

1Level 1

2Level 2

By topology, the percentage of all routes configured on the node that


are protected through backup coverage.

459

IS-IS Feature Guide for Routing Devices

Table 15: show isis backup coverage Output Fields (continued)


Field Name

Field Description

IPv4

Percentage of IPv4 unicast routes that are protected through backup


coverage.

IPv6

Percentage of IPv6 unicast routes that are protected through backup


coverage.

CLNS

Percentage of Connectionless Network Service (CLNS) routes that are


protected through backup coverage.

Sample Output
show isis backup coverage
user@host> show isis backup coverage
Backup Coverage:
Topology
Level
Node
IPV4 Unicast
2 28.57%
IPV6 Unicast
2
0.00%

460

IPv4
22.22%
0.00%

IPv6
0.00%
0.00%

CLNS
0.00%
0.00%

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis backup label-switched-path


Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description

Options

show isis backup label-switched-path


<logical-system (all | logical-system-name)>
show isis backup label-switched-path

Command introduced in Junos OS Release 9.5.


Command introduced in Junos OS Release 9.5 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display information about MPLS label-switched-paths (LSPs) designated as backup
routes for IS-IS routes.
noneDisplay information about MPLS LSPs designated as backup routes for IS-IS

routes.
logical-system (all | logical-system-name(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output


Output Fields

view

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

show isis backup coverage on page 459

show isis backup label-switched-path on page 462


Table 16 on page 461 lists the output fields for the show isis backup label-switched-path
command. Output fields are listed in the approximate order in which they appear.

Table 16: show isis backup label-switched-path Output Fields


Field Name

Field Description

Backup MPLS LSPs

List of MPLS LSPs designated as backup paths for IS-IS routes.

Egress

IP address of the egress routing device for the LSP.

Copyright 2015, Juniper Networks, Inc.

461

IS-IS Feature Guide for Routing Devices

Table 16: show isis backup label-switched-path Output Fields (continued)


Field Name

Field Description

Status

State of the LSP:

UpThe routing device can detect RSVP hello messages from the neighbor.

DownThe routing device has received one of the following indications:

Communication failure from the neighbor.

Communication from IGP that the neighbor is unavailable.

Change in the sequence numbers in the RSVP hello messages sent by the neighbor.

DeletedLSP is no longer available as a backup path.

Last change

Time elapsed since the neighbor state changed either from up to down or from down to up. The format
is hh:mm:ss.

TE-metric

Configured traffic engineering metric.

Metric

Configured metric.

Sample Output
show isis backup label-switched-path
user@host> show isis backup label-switched-path
Backup MPLS LSPs:
f-to-g, Egress: 192.168.1.4, Status: up, Last change: 06:12:03
TE-metric: 9, Metric: 0

462

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show backup-selection
Syntax

Release Information
Description

Options

show backup-selection
<instance instance-name>
<interface interface-name>
<logical-system logical-system-name>
<prefix prefix>

Command introduced in Junos OS Release 14.1.


Display the configured policies for each destination (IPv4 and IPv6) and a primary
next-hop interface.
instance instance-name(Optional) Display configured policy for the routing instance.
interface interface-name(Optional) Display configured policy for the interface.
logical-system logical-system-name(Optional) Display configured policy for a particular

logical system or for all logical systems.


prefix prefix(Optional) Display configured policy for the destination.

Required Privilege
Level
List of Sample Output

Output Fields

view

show backup-selection on page 464


show backup-selection instance instance-name on page 465
show backup-selection interface interface-name on page 466
show backup-selection logical-system all on page 466
show backup-selection logical-system logical-system-name on page 468
show backup-selection prefix prefix on page 468
Table 17 on page 463 describes the output fields for the show backup-selection command.
Output fields are listed in the approximate order in which they appear.

Table 17: show backup-selection Output Fields


Field Name

Field Description

Prefix

Destination prefix .

Interface

Primary interface to reach the destination.

all All the interfaces on the router which requires backup path.

<interface-name> Specific primary interface in the backup path.

admin-group exclude

Specifies the administrative groups to be excluded. The backup path is not selected as the
loop free alternative or backup next hop if any of the links in the path have any one of the listed
administrative groups.

admin-group include-all

Requires each link in the backup path to have all the listed administrative groups in order to
accept the path.

Copyright 2015, Juniper Networks, Inc.

463

IS-IS Feature Guide for Routing Devices

Table 17: show backup-selection Output Fields (continued)


Field Name

Field Description

admin-group include-any

Requires each link in the backup path to have at least one of the listed administrative groups
in order to select the path.

admin-group preference

Defines an ordered set of administrative groups that specifies the preference of the backup
path. The leftmost element in the set is given the highest preference.

nodes excluded

Specifies the list of nodes to be excluded. The backup path that has a router from the list is
not selected as the loop free alternative or backup next hop.

nodes preference

Defines an ordered set of nodes to be preferred. The backup path having the leftmost node
is selected.

node-tags excluded

Specifies the backup selection to exclude the set of route tags in the backup path selection.

node-tags preference

Specifies the set of route tags in descending order of preference.

protection-type

Specifies the required protection type of the backup path.

node Selects a backup path that provides node protection.

link Selects the backup path that provides link protection.

node-link Allows either node or link protection LFA where node-protection LFA is preferred
over link-protection LFA.

downstream paths only

Selects the backup path that is a downstream path to the destination.

srlg

Evaluates common srlgs between the primary link and each link in the backup path.

strict Rejects the backup path that has common srlgs between the primary link and any
link in the backup path.

loose Allows the backup path that has common srlgs between the primary link and any
link in the backup path. The backup path with the fewer number of srlg collisions is preferred.

B/W >= primary

Uses backup next hop only if the bandwidth is greater than or equal to the primary next hop.

root-metric

Metric to one-hop node or remote router such as an RSVP backup label switched path (LSP)
tail-end router.

dest-metric

Metric from one-hop node or remote router such as an RSVP backup label switched path
(LSP) tail-end router to the final destination.

metric evaluation order

Defines the evaluation order of the metric (root and dest metrics) results.

policy evaluation order

Defines the evaluation order of the backup policy.

Sample Output
show backup-selection
user@host> show backup-selection

464

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Prefix: 0.0.0.0/0
Interface: all
Admin-group exclude: c6
Admin-group include-all: c1 c2
Admin-group include-any: c3 c4
Admin-group preference: c8
Nodes excluded: 100.0.7.2
Node preference: 100.2.6.2
Node-tags excluded: 1004
Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Node-Tag, Metric
Interface: ge-1/2/5.0
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c4
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection
Prefix: 10.150.0.0/16
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c5
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Node-tags excluded: 1004
Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: ::/0
Interface: all
Admin-group exclude: c2
Admin-group include-all: c1 c3
Admin-group include-any: c4 c5
Admin-group preference: c6
Node preference: 100.0.1.2
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth

show backup-selection instance instance-name


user@host> show backup-selection instance r
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-any: c4
Admin-group preference: c6 c0
Nodes excluded: 100.0.4.2
Node preference: 100.4.5.1

Copyright 2015, Juniper Networks, Inc.

465

IS-IS Feature Guide for Routing Devices

Node-tags excluded: 1007


Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth

show backup-selection interface interface-name


user@host> show backup-selection interface ge-1/2/5.0
Prefix: 0.0.0.0/0
Interface: ge-1/2/5.0
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c4
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection
Prefix: 10.150.0.0/16
Prefix: ::/0

show backup-selection logical-system all


user@host> show backup-selection logical-system all
logical-system: R0
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Root-metric, Dest-metric
----logical-system: R5
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R1
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R4
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0

466

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Loose, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R3
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Node preference: 10.255.102.178
Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R7
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R2
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
----logical-system: R6
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric

Copyright 2015, Juniper Networks, Inc.

467

IS-IS Feature Guide for Routing Devices

----logical-system: default
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag

show backup-selection logical-system logical-system-name


user@host> show backup-selection logical-system R3
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 0.0.0.0/0
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c3
Node preference: 10.255.102.178
Node-tag preference: 1004
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth
Prefix: 100.0.1.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag
Prefix: 100.0.7.0/24
Interface: all
Protection Type: Link, Downstream Paths Only: Disabled, SRLG: Strict, B/w >=
Primary: Disabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth, Protection, Node,
Metric, Node-Tag

show backup-selection prefix prefix


user@host> show backup-selection prefix 10.150.0.0
Prefix: 10.150.0.0/16
Interface: all
Admin-group include-all: c1
Admin-group include-any: c2
Admin-group preference: c5
Nodes excluded: 10.218.32.0
Node preference: 10.92.8.0

468

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Node-tags excluded: 1004


Node-tag preference: 1007
Protection Type: Link, Downstream Paths Only: Enabled, SRLG: Loose, B/w >=
Primary: Enabled, Root-metric: lowest, Dest-metric: lowest
Metric Evaluation Order: Dest-metric, Root-metric
Policy Evaluation Order: Admin-group, SRLG, Bandwidth

Copyright 2015, Juniper Networks, Inc.

469

IS-IS Feature Guide for Routing Devices

show isis backup spf results


Syntax

Syntax (EX Series


Switches)

Release Information
Description
Options

show isis backup spf results


<instance instance-name>
<level (1 | 2)>
<logical-system (all | logical-system-name)>
<no-coverage>
<topology (ipv4-unicast | ipv6-multicast | ipv6-unicast | unicast)>
show isis backup spf results
<instance instance-name>
<level (1 | 2)>
<no-coverage>
<topology (ipv4-unicast | unicast)>

Command introduced in Junos OS Release 9.5.


Display information about IS-IS shortest-path-first (SPF) calculations for backup paths.
noneDisplay information about IS-IS SPF calculations for all backup paths for all

destination nodes.
instance instance-name(Optional) Display SPF calculations for backup paths for the

specified routing instance.


level (1 | 2)(Optional) Display SPF calculations for the backup paths for the specified

IS-IS level.
logical-system logical-system-name(Optional) Display SPF calculations for the backup

paths for all logical systems or on a particular logical system.


no-coverage(Optional) Display SPF calculations only for destinations that do not have

backup coverage.
topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)(Optional) Display

SPF calculations for backup paths for the specified topology only.
Required Privilege
Level
Related
Documentation

List of Sample Output

Output Fields

470

view

show isis backup coverage on page 459

Understanding Loop-Free Alternate Routes for IS-IS on page 159

Example: Configuring Node-Link Protection for IS-IS Routes in a Layer 3 VPN on page 163

show isis backup spf results on page 471


show isis backup spf results no-coverage on page 472
Table 18 on page 471 lists the output fields for the show isis backup spf results command.
Output fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 18: show isis backup spf results Output Fields


Field Name

Field Description

node-name

Name of the destination node.

Address

Address of the destination node.

Primary next-hop

Interface and name of the node of the primary next hop to reach the
destination.

Root

Name of the next-hop neighbor.

Metric

Metric to the node.

Eligible

Indicates that the next-hop neighbor has been designated as a backup


path to the destination node.

Backup next-hop

Name of the interface of the backup next hop.

SNPA

Subnetwork point of attachment (MAC address of the next hop).

LSP

Name of the MPLS label-switched path (LSP) designated as a backup


path.

Not eligible

Indicates that the next-hop neighbor cannot function as a backup path


to the destination.

Reason

Describes why the next-hop neighbor is designated as Not eligible as


a backup path.

Sample Output
show isis backup spf results
user@host> show isis backup spf results
D.00
Primary next-hop: fe-1/0/0.0, IPV4, R2.00, SNPA: 0:12:1e:cb:cc:dc
Primary next-hop: fe-1/0/0.0, IPV6, R2.00, SNPA: 0:12:1e:cb:cc:dc
Root: R2 via Direct, Root Metric: 1, Metric: 1, Root Preference: 0x0
Not eligible, IPV4, Reason: Primary next-hop link fate sharing
Not eligible, IPV6, Reason: Primary next-hop link fate sharing
Root: S via Direct, Root Metric: 1, Metric: 3, Root Preference: 0x0
track-item: R1.00-00
Not eligible, IPV4, Reason: Path loops
Not eligible, IPV6, Reason: Path loops
Root: R4 via LDP, Root Metric: 3, Metric: 1, Root Preference: 0x0
Eligible, IPV4, Protection-Type: Node Protect, Downstream Path
Backup next-hop: fe-1/2/0.0, LSP LDP->R4(192.168.1.4)
Eligible, IPV6, Protection-Type: Node Protect, Downstream Path
Backup next-hop: fe-1/2/0.0, LSP LDP->R4(192.168.1.4)
Root: R3 via LDP, Root Metric: 2, Metric: 2, Root Preference: 0x0
Eligible, IPV4, Protection-Type: Node Protect, Downstream Path, Active
Backup next-hop: fe-1/2/0.0, LSP LDP->R3(192.168.1.3)

Copyright 2015, Juniper Networks, Inc.

471

IS-IS Feature Guide for Routing Devices

Eligible, IPV6, Protection-Type: Node Protect, Downstream Path, Active


Backup next-hop: fe-1/2/0.0, LSP LDP->R3(192.168.1.3)

show isis backup spf results no-coverage


user@host> show isis backup spf results no-coverage
IS-IS level 1 SPF results:
pro-bng3-k.00
Primary next-hop: fe-1/3/3.0, IPV4, pro-bng3-k, SNPA: b0:c6:9a:2c:f0:de
Primary next-hop: fe-1/3/3.0, IPV6, pro-bng3-k, SNPA: b0:c6:9a:2c:f0:de
Root: pro-bng3-k, Root Metric: 10, Metric: 0, Root Preference: 0x0
Root: pro-bng3-i, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: pro-bng3-k.00-00
track-item: pro-bng3-j.00-00
pro-bng3-i.00
Primary next-hop: fe-0/1/2.0, IPV4, pro-bng3-i, SNPA: b0:c6:9a:2a:f4:21
Primary next-hop: fe-0/1/2.0, IPV6, pro-bng3-i, SNPA: b0:c6:9a:2a:f4:21
Root: pro-bng3-i, Root Metric: 10, Metric: 0, Root Preference: 0x0
Root: pro-bng3-k, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: pro-bng3-j.00-00
track-item: pro-bng3-i.00-00
2 nodes
IS-IS level 2 SPF results:
pro-bng3-k.00
Primary next-hop: fe-1/3/3.0, IPV4, pro-bng3-k, SNPA: b0:c6:9a:2c:f0:de
Primary next-hop: fe-1/3/3.0, IPV6, pro-bng3-k, SNPA: b0:c6:9a:2c:f0:de
Root: pro-bng3-k, Root Metric: 10, Metric: 0, Root Preference: 0x0
Root: pro-bng3-i, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: pro-bng3-k.00-00
track-item: pro-bng3-j.00-00
pro-bng3-i.00
Primary next-hop: fe-0/1/2.0, IPV4, pro-bng3-i, SNPA: b0:c6:9a:2a:f4:21
Primary next-hop: fe-0/1/2.0, IPV6, pro-bng3-i, SNPA: b0:c6:9a:2a:f4:21
Root: pro-bng3-i, Root Metric: 10, Metric: 0, Root Preference: 0x0
Root: pro-bng3-k, Root Metric: 10, Metric: 20, Root Preference: 0x0
track-item: pro-bng3-j.00-00
track-item: pro-bng3-i.00-00
2 nodes

472

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis context-identifier


Syntax

Release Information
Description
Options

show isis context-identifier


<brief | detail | extensive>
<identifier name>
<instance instance-name>
<logical-system (all | logical-system-name)>

Command introduced in Junos OS Release 10.4.


Display IS-IS context identifier information.
brief | detail | extensive(Optional) Display the specified level of output.
identifier name(Optional) Display information about the specified context identifier.
instance instance-name(Optional) Display entries for the specified routing instance.
logical-system (all | logical-system-name)(Optional) Display the context identifier

information for all logical systems or for a particular logical system.


Required Privilege
Level
Output Fields

View

Table 19 on page 473 lists the output fields for the show isis context-identifier command.
Output fields are listed in the approximate order in which they appear.

Table 19: show isis context-identifier Output Fields


Field Name

Field Description

Level of Output

Context

IPv4 address that defines a protection pair. The context is manually


configured on both primary and protector PEs.

detail

Owner

Protocol that requires the context.

detail

Role

Role of the PE, which is either primary or protector.

detail

Primary

Name of the primary PE.

detail

Metric

Advertised interior gateway protocol (IGP) metric.

detail

Sample Output
user@host> show isis context-identifier detail
IS-IS context database:
Context
Owner
Role
Primary
Metric
2.2.4.3
MPLS
Primary
pro3-e
1
Advertiser pro3-e, Router ID 10.255.245.198, Metric 1, Level 1
Advertiser pro3-e, Router ID 10.255.245.198, Metric 1, Level 2
Advertiser pro3-c, Router ID 10.255.245.196, Metric 11, Level 2

Copyright 2015, Juniper Networks, Inc.

473

IS-IS Feature Guide for Routing Devices

474

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis database


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)

Release Information

Description

Options

Syntax on page 475


Syntax (EX Series Switches and QFX Series) on page 475
show isis database
<system-id>
<brief | detail | extensive>
<instance instance-name>
<level (1 | 2)>
<logical-system (all | logical-system-name)>
show isis database
<system-id>
<brief | detail | extensive>
<level (1 | 2)>
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display the entries in the IS-IS link-state database, which contains data about PDU
packets.
noneDisplay standard information about IS-IS link-state database entries for all routing

instances.
system id(Optional) Display IS-IS link-state database entries for the specified

intermediate system.
brief | detail | extensive(Optional) Display the specified level of output.
instance instance-name(Optional) Display IS-IS link-state database entries for the

specified routing instance.


level (1 | 2)(Optional) Display IS-IS link-state database entries for the specified IS-IS

level.
logical-system (all | logical-system-name)(Optional) Display standard information

about IS-IS link-state database entries for all logical systems or for a particular
logical system.
Required Privilege
Level
Related
Documentation
List of Sample Output

view

clear isis database on page 423

show isis database on page 477


show isis database brief on page 478

Copyright 2015, Juniper Networks, Inc.

475

IS-IS Feature Guide for Routing Devices

show isis database detail on page 478


show isis database extensive on page 478
Output Fields

Table 20 on page 476 describes the output fields for the show isis database command.
Output fields are listed in the approximate order in which they appear. Fields that contain
internal IS-IS information useful only in troubleshooting obscure problems are not
described in the table. For more details about these fields, contact your customer support
representative.

Table 20: show isis database Output Fields


Field Name

Field Description

Level of Output

Interface name

Name of the interface on which the link-state PDU has been received; always
IS-IS for this command.

All levels

level

Level of intermediate system:

All levels

1Intermediate system routes within an area; when the destination is outside

an area, it routes toward a Level 2 system.

2Intermediate system routes between areas and toward other ASs.

LSP ID

Link-state PDU identifier.

All levels

Sequence

Sequence number of the link-state PDU.

All levels

Checksum

Checksum value of the link-state PDU.

All levels

Lifetime (secs)

Remaining lifetime of the link-state PDU, in seconds.

All levels

Attributes

Attributes of the specified database: L1, L2, Overload, or Attached (L1 only).

none brief

# LSPs

Total number of link-state PDUs in the specified link-state database.

none brief

IP prefix

Prefix advertised by this link-state PDU.

detail extensive

IS neighbor

IS-IS neighbor of the advertising system.

detail extensive

IP prefix

IPv4 prefix advertised by this link-state PDU.

detail extensive

V6 prefix

IPv6 prefix advertised by this link-state PDU.

detail extensive

Metric

Metric of the prefix or neighbor.

detail extensive

Header

LSP IDLink state PDU identifier of the header.

extensive

LengthHeader length.

Allocated LengthAmount of length available for the header.

Router IDAddress of the local routing device.

Remaining LifetimeRemaining lifetime of the link-state PDU, in seconds.

476

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 20: show isis database Output Fields (continued)


Field Name

Field Description

Level of Output

Packet

LSP IDThe identifier for the link-state PDU.

extensive

LengthPacket length.

LifetimeRemaining lifetime, in seconds.

ChecksumThe checksum of the link-state PDU.

SequenceThe sequence number of the link-state PDU. Every time the

link-state PDU is updated, this number increments.

TLVs

AttributesPacket attributes.

NLPIDNetwork layer protocol identifier.

Fixed lengthSpecifies the set length for the packet.

Area AddressArea addresses that the routing device can reach.

SpeaksSupported routing protocols.

IP router idID of the routing device (usually the IP address).

IP addressIPv4 address.

HostnameAssigned name of the routing device.

IP prefixIP prefix of the routing device.

MetricIS-IS metric that measures the cost of the adjacency between the

extensive

originating routing device and the advertised routing device.

IP extended prefixExtended IP prefix of the routing device.

IS neighborDirectly attached neighbors name and metric.

IS extended neighborDirectly attached neighbors name, metric, IP address,

local interface index, and remote interface index.


The interface indexes enable Junos OS to support unnumbered extensions
for IS-IS, as described in RFC 4205.

Sample Output
show isis database
user@host> show isis database
IS-IS level 1 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
kobuk.00-00
0x3
0x3167
1057 L1 L2
camaro.00-00
0x5
0x770e
1091 L1 L2
ranier.00-00
0x4
0xaa95
1091 L1 L2
glacier.00-00
0x4
0x206f
1089 L1 L2
glacier.02-00
0x1
0xd141
1089 L1 L2
badlands.00-00
0x3
0x87a2
1093 L1 L2
6 LSPs
IS-IS level 2 link-state database:
LSP ID
Sequence Checksum Lifetime Attributes
kobuk.00-00
0x6
0x8d6b
1096 L1 L2
camaro.00-00
0x9
0x877b
1101 L1 L2
ranier.00-00
0x8
0x855d
1103 L1 L2
glacier.00-00
0x7
0xf892
1098 L1 L2
glacier.02-00
0x1
0xd141
1089 L1 L2
badlands.00-00
0x6
0x562
1105 L1 L2
6 LSPs

Copyright 2015, Juniper Networks, Inc.

477

IS-IS Feature Guide for Routing Devices

show isis database brief


The output for the show isis database brief command is identical to that for the show isis
database command. For sample output, see show isis database on page 477.
show isis database detail
user@host> show isis database logical-system CE3 sisira.00-00 detail
IS-IS level 1 link-state database:
sisira.00-00 Sequence: 0x11, Checksum: 0x10fc, Lifetime: 975 secs
IS neighbor: hemantha-CE3.02
Metric:
10
ES neighbor: 0015.0015.0015
Metric:
10 Down
ES neighbor: 0025.0025.0025
Metric:
10 Down
ES neighbor: 0030.0030.0030
Metric:
10 Down
ES neighbor: 0040.0040.0040
Metric:
10 Down
ES neighbor: sisira
Metric:
0
IP prefix: 1.0.0.0/24
Metric:
10 External
IP prefix: 3.0.0.0/24
Metric:
10 External
IP prefix: 4.0.0.0/24
Metric:
10 External
IP prefix: 5.0.0.0/24
Metric:
10 Internal
IP prefix: 15.15.15.15/32
Metric:
10 External
IP prefix: 25.25.25.25/32
Metric:
10 External
IP prefix: 30.30.30.30/32
Metric:
10 External
IP prefix: 40.40.40.40/32
Metric:
10 External
IP prefix: 60.60.60.60/32
Metric:
0 Internal

Down
Down
Down
Up
Down
Down
Down
Down
Up

IS-IS level 2 link-state database:


sisira.00-00 Sequence: 0x13, Checksum: 0x69ac, Lifetime: 993 secs
IS neighbor: hemantha-CE3.02
Metric:
10
IP prefix: 1.0.0.0/24
Metric:
10 External
IP prefix: 3.0.0.0/24
Metric:
10 External
IP prefix: 4.0.0.0/24
Metric:
10 External
IP prefix: 5.0.0.0/24
Metric:
10 Internal
IP prefix: 15.15.15.15/32
Metric:
10 External
IP prefix: 25.25.25.25/32
Metric:
10 External
IP prefix: 30.30.30.30/32
Metric:
10 External
IP prefix: 40.40.40.40/32
Metric:
10 External
IP prefix: 50.50.50.50/32
Metric:
10 Internal
IP prefix: 60.60.60.60/32
Metric:
0 Internal
ISO prefix: 60.0006.80ff.f800.0000.0108.0001.0015.0015.0015/152
Metric:
10 External
ISO prefix: 60.0006.80ff.f800.0000.0108.0001.0025.0025.0025/152
Metric:
10 External
ISO prefix: 60.0006.80ff.f800.0000.0108.0001.0030.0030.0030/152
Metric:
10 External
ISO prefix: 60.0006.80ff.f800.0000.0108.0001.0040.0040.0040/152
Metric:
10 External
ISO prefix: 60.0006.80ff.f800.0000.0108.0001.0060.0060.0060/152
Metric:
0 Internal

Down
Down
Down
Up
Down
Down
Down
Down
Up
Up
Down
Down
Down
Down
Up

show isis database extensive


user@host> show isis database extensive
IS-IS level 1 link-state database:
Router-A.00-00 Sequence: 0x1, Checksum: 0xf75c, Lifetime: 1116 secs

478

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

IP prefix: 192.168.0.1/32

Metric:

0 Internal Up

Header: LSP ID: Router-A.00-00, Length: 85 bytes


Allocated length: 1492 bytes, Router ID: 192.168.0.1
Remaining lifetime: 1116 secs, Level: 1, Interface: 0
Estimated free bytes: 1353, Actual free bytes: 1407
Aging timer expires in: 1116 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-A.00-00, Length: 85 bytes, Lifetime : 1200 secs
Checksum: 0xf75c, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 18, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.1
IP address: 192.168.0.1
Hostname: Router-A
IP prefix: 192.168.0.1/32, Internal, Metric: default 0, Up
IP extended prefix: 192.168.0.1/32 metric 0 up
No queued transmissions
IS-IS level 2 link-state database:
Router-A.00-00 Sequence: 0x5, Checksum: 0x3196, Lifetime: 1158
IS neighbor: Router-B.02
Metric:
Two-way fragment: Router-B.02-00, Two-way first fragment:
IS neighbor: Router-E.02
Metric:
Two-way fragment: Router-E.02-00, Two-way first fragment:
IP prefix: 10.0.0.0/30
Metric:
10
IP prefix: 10.0.0.4/30
Metric:
10
IP prefix: 192.168.0.1/32
Metric:
0

secs
10
Router-B.02-00
10
Router-E.02-00
Internal Up
Internal Up
Internal Up

Header: LSP ID: Router-A.00-00, Length: 208 bytes


Allocated length: 1492 bytes, Router ID: 192.168.0.1
Remaining lifetime: 1158 secs, Level: 2, Interface: 0
Estimated free bytes: 1233, Actual free bytes: 1284
Aging timer expires in: 1158 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-A.00-00, Length: 208 bytes, Lifetime : 1198 secs
Checksum: 0x3196, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.1
IP address: 192.168.0.1
Hostname: Router-A
IP prefix: 192.168.0.1/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.4/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.0/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.1/32 metric 0 up

Copyright 2015, Juniper Networks, Inc.

479

IS-IS Feature Guide for Routing Devices

IP
IP
IS
IS
IS

extended prefix: 10.0.0.4/30 metric 10 up


extended prefix: 10.0.0.0/30 metric 10 up
neighbor: Router-E.02, Internal, Metric: default 10
neighbor: Router-B.02, Internal, Metric: default 10
extended neighbor: Router-E.02, Metric: default 10
IP address: 10.0.0.1
Local interface index: 101, Remote interface index: 0
IS extended neighbor: Router-B.02, Metric: default 10
IP address: 10.0.0.5
Local interface index: 102, Remote interface index: 0
No queued transmissions
Router-B.00-00 Sequence: 0x5, Checksum: 0xf8f, Lifetime: 1183 secs
IS neighbor: Router-B.02
Metric:
10
Two-way fragment: Router-B.02-00, Two-way first fragment: Router-B.02-00
IS neighbor: Router-C.02
Metric:
10
Two-way fragment: Router-C.02-00, Two-way first fragment: Router-C.02-00
IP prefix: 10.0.0.4/30
Metric:
10 Internal Up
IP prefix: 10.0.0.8/30
Metric:
10 Internal Up
IP prefix: 192.168.0.2/32
Metric:
0 Internal Up
Header: LSP ID: Router-B.00-00, Length: 208 bytes
Allocated length: 284 bytes, Router ID: 192.168.0.2
Remaining lifetime: 1183 secs, Level: 2, Interface: 102
Estimated free bytes: 114, Actual free bytes: 76
Aging timer expires in: 1183 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-B.00-00, Length: 208 bytes, Lifetime : 1196 secs
Checksum: 0xf8f, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.2
IP address: 192.168.0.2
Hostname: Router-B
IP prefix: 192.168.0.2/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.4/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.8/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.2/32 metric 0 up
IP extended prefix: 10.0.0.4/30 metric 10 up
IP extended prefix: 10.0.0.8/30 metric 10 up
IS neighbor: Router-B.02, Internal, Metric: default 10
IS neighbor: Router-C.02, Internal, Metric: default 10
IS extended neighbor: Router-B.02, Metric: default 10
IP address: 10.0.0.6
Local interface index: 108, Remote interface index: 0
IS extended neighbor: Router-C.02, Metric: default 10
IP address: 10.0.0.9
Local interface index: 109, Remote interface index: 0
No queued transmissions
Router-B.02-00 Sequence: 0x1, Checksum: 0x3c7c, Lifetime: 1156 secs
IS neighbor: Router-A.00
Metric:
0
Two-way fragment: Router-A.00-00, Two-way first fragment: Router-A.00-00
IS neighbor: Router-B.00
Metric:
0

480

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Two-way fragment: Router-B.00-00, Two-way first fragment: Router-B.00-00


Header: LSP ID: Router-B.02-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1156 secs, Level: 2, Interface: 102
Estimated free bytes: 208, Actual free bytes: 208
Aging timer expires in: 1156 secs
Packet: LSP ID: Router-B.02-00, Length: 76 bytes, Lifetime : 1196 secs
Checksum: 0x3c7c, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
IS neighbor: Router-B.00, Internal, Metric: default 0
IS neighbor: Router-A.00, Internal, Metric: default 0
IS extended neighbor: Router-B.00, Metric: default 0
IS extended neighbor: Router-A.00, Metric: default 0
No queued transmissions
Router-C.00-00 Sequence: 0x5, Checksum: 0x255b, Lifetime: 1182
IS neighbor: Router-C.02
Metric:
Two-way fragment: Router-C.02-00, Two-way first fragment:
IS neighbor: Router-D.03
Metric:
Two-way fragment: Router-D.03-00, Two-way first fragment:
IP prefix: 10.0.0.8/30
Metric:
10
IP prefix: 10.0.0.12/30
Metric:
10
IP prefix: 192.168.0.3/32
Metric:
0

secs
10
Router-C.02-00
10
Router-D.03-00
Internal Up
Internal Up
Internal Up

Header: LSP ID: Router-C.00-00, Length: 208 bytes


Allocated length: 284 bytes, Router ID: 192.168.0.3
Remaining lifetime: 1182 secs, Level: 2, Interface: 102
Estimated free bytes: 114, Actual free bytes: 76
Aging timer expires in: 1182 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-C.00-00, Length: 208 bytes, Lifetime : 1196 secs
Checksum: 0x255b, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.3
IP address: 192.168.0.3
Hostname: Router-C
IP prefix: 192.168.0.3/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.8/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.12/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.3/32 metric 0 up
IP extended prefix: 10.0.0.8/30 metric 10 up
IP extended prefix: 10.0.0.12/30 metric 10 up
IS neighbor: Router-C.02, Internal, Metric: default 10
IS neighbor: Router-D.03, Internal, Metric: default 10
IS extended neighbor: Router-C.02, Metric: default 10
IP address: 10.0.0.10
Local interface index: 105, Remote interface index: 0
IS extended neighbor: Router-D.03, Metric: default 10

Copyright 2015, Juniper Networks, Inc.

481

IS-IS Feature Guide for Routing Devices

IP address: 10.0.0.13
Local interface index: 106, Remote interface index: 0
No queued transmissions
Router-C.02-00 Sequence: 0x1, Checksum: 0xaa09, Lifetime: 1181 secs
IS neighbor: Router-B.00
Metric:
0
Two-way fragment: Router-B.00-00, Two-way first fragment: Router-B.00-00
IS neighbor: Router-C.00
Metric:
0
Two-way fragment: Router-C.00-00, Two-way first fragment: Router-C.00-00
Header: LSP ID: Router-C.02-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1181 secs, Level: 2, Interface: 102
Estimated free bytes: 208, Actual free bytes: 208
Aging timer expires in: 1181 secs
Packet: LSP ID: Router-C.02-00, Length: 76 bytes, Lifetime : 1194 secs
Checksum: 0xaa09, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
IS neighbor: Router-C.00, Internal, Metric: default 0
IS neighbor: Router-B.00, Internal, Metric: default 0
IS extended neighbor: Router-C.00, Metric: default 0
IS extended neighbor: Router-B.00, Metric: default 0
No queued transmissions
Router-D.00-00 Sequence: 0x4, Checksum: 0x8ab7, Lifetime: 1180
IS neighbor: Router-D.02
Metric:
Two-way fragment: Router-D.02-00, Two-way first fragment:
IS neighbor: Router-D.03
Metric:
Two-way fragment: Router-D.03-00, Two-way first fragment:
IP prefix: 10.0.0.12/30
Metric:
10
IP prefix: 10.0.0.20/30
Metric:
10
IP prefix: 192.168.0.4/32
Metric:
0

secs
10
Router-D.02-00
10
Router-D.03-00
Internal Up
Internal Up
Internal Up

Header: LSP ID: Router-D.00-00, Length: 208 bytes


Allocated length: 284 bytes, Router ID: 192.168.0.4
Remaining lifetime: 1180 secs, Level: 2, Interface: 102
Estimated free bytes: 114, Actual free bytes: 76
Aging timer expires in: 1180 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-D.00-00, Length: 208 bytes, Lifetime : 1192 secs
Checksum: 0x8ab7, Sequence: 0x4, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.4
IP address: 192.168.0.4
Hostname: Router-D
IP prefix: 192.168.0.4/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.12/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.20/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.4/32 metric 0 up

482

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

IP
IP
IS
IS
IS

extended prefix: 10.0.0.12/30 metric 10 up


extended prefix: 10.0.0.20/30 metric 10 up
neighbor: Router-D.02, Internal, Metric: default 10
neighbor: Router-D.03, Internal, Metric: default 10
extended neighbor: Router-D.02, Metric: default 10
IP address: 10.0.0.22
Local interface index: 115, Remote interface index: 0
IS extended neighbor: Router-D.03, Metric: default 10
IP address: 10.0.0.14
Local interface index: 114, Remote interface index: 0
No queued transmissions
Router-D.02-00 Sequence: 0x1, Checksum: 0xebbc, Lifetime: 1128 secs
IS neighbor: Router-D.00
Metric:
0
Two-way fragment: Router-D.00-00, Two-way first fragment: Router-D.00-00
IS neighbor: Router-F.00
Metric:
0
Two-way fragment: Router-F.00-00, Two-way first fragment: Router-F.00-00
Header: LSP ID: Router-D.02-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1128 secs, Level: 2, Interface: 101
Estimated free bytes: 208, Actual free bytes: 208
Aging timer expires in: 1128 secs
Packet: LSP ID: Router-D.02-00, Length: 76 bytes, Lifetime : 1160 secs
Checksum: 0xebbc, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
IS neighbor: Router-D.00, Internal, Metric: default 0
IS neighbor: Router-F.00, Internal, Metric: default 0
IS extended neighbor: Router-D.00, Metric: default 0
IS extended neighbor: Router-F.00, Metric: default 0
No queued transmissions
Router-D.03-00 Sequence: 0x1, Checksum: 0x129b, Lifetime: 1180 secs
IS neighbor: Router-C.00
Metric:
0
Two-way fragment: Router-C.00-00, Two-way first fragment: Router-C.00-00
IS neighbor: Router-D.00
Metric:
0
Two-way fragment: Router-D.00-00, Two-way first fragment: Router-D.00-00
Header: LSP ID: Router-D.03-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1180 secs, Level: 2, Interface: 101
Estimated free bytes: 208, Actual free bytes: 208
Aging timer expires in: 1180 secs
Packet: LSP ID: Router-D.03-00, Length: 76 bytes, Lifetime : 1192 secs
Checksum: 0x129b, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
IS neighbor: Router-D.00, Internal, Metric: default 0
IS neighbor: Router-C.00, Internal, Metric: default 0
IS extended neighbor: Router-D.00, Metric: default 0
IS extended neighbor: Router-C.00, Metric: default 0
No queued transmissions
Router-E.00-00 Sequence: 0x4, Checksum: 0x9da9, Lifetime: 1155 secs

Copyright 2015, Juniper Networks, Inc.

483

IS-IS Feature Guide for Routing Devices

IS neighbor: Router-E.02
Metric:
Two-way fragment: Router-E.02-00, Two-way first fragment:
IS neighbor: Router-F.02
Metric:
Two-way fragment: Router-F.02-00, Two-way first fragment:
IP prefix: 10.0.0.0/30
Metric:
10
IP prefix: 10.0.0.16/30
Metric:
20
IP prefix: 192.168.0.5/32
Metric:
0

10
Router-E.02-00
20
Router-F.02-00
Internal Up
Internal Up
Internal Up

Header: LSP ID: Router-E.00-00, Length: 208 bytes


Allocated length: 284 bytes, Router ID: 192.168.0.5
Remaining lifetime: 1155 secs, Level: 2, Interface: 101
Estimated free bytes: 114, Actual free bytes: 76
Aging timer expires in: 1155 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-E.00-00, Length: 208 bytes, Lifetime : 1185 secs
Checksum: 0x9da9, Sequence: 0x4, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.5
IP address: 192.168.0.5
Hostname: Router-E
IP prefix: 192.168.0.5/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.16/30, Internal, Metric: default 20, Up
IP prefix: 10.0.0.0/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.5/32 metric 0 up
IP extended prefix: 10.0.0.16/30 metric 20 up
IP extended prefix: 10.0.0.0/30 metric 10 up
IS neighbor: Router-E.02, Internal, Metric: default 10
IS neighbor: Router-F.02, Internal, Metric: default 20
IS extended neighbor: Router-E.02, Metric: default 10
IP address: 10.0.0.2
Local interface index: 112, Remote interface index: 0
IS extended neighbor: Router-F.02, Metric: default 20
IP address: 10.0.0.17
Local interface index: 111, Remote interface index: 0
No queued transmissions
Router-E.02-00 Sequence: 0x1, Checksum: 0xb4fa, Lifetime: 1130 secs
IS neighbor: Router-A.00
Metric:
0
Two-way fragment: Router-A.00-00, Two-way first fragment: Router-A.00-00
IS neighbor: Router-E.00
Metric:
0
Two-way fragment: Router-E.00-00, Two-way first fragment: Router-E.00-00
Header: LSP ID: Router-E.02-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1130 secs, Level: 2, Interface: 101
Estimated free bytes: 208, Actual free bytes: 208
Aging timer expires in: 1130 secs
Packet: LSP ID: Router-E.02-00, Length: 76 bytes, Lifetime : 1161 secs
Checksum: 0xb4fa, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0

484

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

TLVs:
IS neighbor: Router-E.00, Internal, Metric: default 0
IS neighbor: Router-A.00, Internal, Metric: default 0
IS extended neighbor: Router-E.00, Metric: default 0
IS extended neighbor: Router-A.00, Metric: default 0
No queued transmissions
Router-F.00-00 Sequence: 0x5, Checksum: 0x94bd, Lifetime: 1153
IS neighbor: Router-D.02
Metric:
Two-way fragment: Router-D.02-00, Two-way first fragment:
IS neighbor: Router-F.02
Metric:
Two-way fragment: Router-F.02-00, Two-way first fragment:
IP prefix: 10.0.0.16/30
Metric:
10
IP prefix: 10.0.0.20/30
Metric:
10
IP prefix: 192.168.0.6/32
Metric:
0

secs
10
Router-D.02-00
10
Router-F.02-00
Internal Up
Internal Up
Internal Up

Header: LSP ID: Router-F.00-00, Length: 208 bytes


Allocated length: 284 bytes, Router ID: 192.168.0.6
Remaining lifetime: 1153 secs, Level: 2, Interface: 101
Estimated free bytes: 76, Actual free bytes: 76
Aging timer expires in: 1153 secs
Protocols: IP, IPv6
Packet: LSP ID: Router-F.00-00, Length: 208 bytes, Lifetime : 1183 secs
Checksum: 0x94bd, Sequence: 0x5, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
Area address: 49.0002 (3)
LSP Buffer Size: 1492
Speaks: IP
Speaks: IPV6
IP router id: 192.168.0.6
IP address: 192.168.0.6
Hostname: Router-F
IP prefix: 192.168.0.6/32, Internal, Metric: default 0, Up
IP prefix: 10.0.0.16/30, Internal, Metric: default 10, Up
IP prefix: 10.0.0.20/30, Internal, Metric: default 10, Up
IP extended prefix: 192.168.0.6/32 metric 0 up
IP extended prefix: 10.0.0.16/30 metric 10 up
IP extended prefix: 10.0.0.20/30 metric 10 up
IS neighbor: Router-D.02, Internal, Metric: default 10
IS neighbor: Router-F.02, Internal, Metric: default 10
IS extended neighbor: Router-D.02, Metric: default 10
IP address: 10.0.0.21
Local interface index: 94, Remote interface index: 0
IS extended neighbor: Router-F.02, Metric: default 10
IP address: 10.0.0.18
Local interface index: 93, Remote interface index: 0
No queued transmissions
Router-F.02-00 Sequence: 0x1, Checksum: 0xf5ae, Lifetime: 1153 secs
IS neighbor: Router-E.00
Metric:
0
Two-way fragment: Router-E.00-00, Two-way first fragment: Router-E.00-00
IS neighbor: Router-F.00
Metric:
0
Two-way fragment: Router-F.00-00, Two-way first fragment: Router-F.00-00
Header: LSP ID: Router-F.02-00, Length: 76 bytes
Allocated length: 284 bytes, Router ID: 0.0.0.0
Remaining lifetime: 1153 secs, Level: 2, Interface: 101

Copyright 2015, Juniper Networks, Inc.

485

IS-IS Feature Guide for Routing Devices

Estimated free bytes: 208, Actual free bytes: 208


Aging timer expires in: 1153 secs
Packet: LSP ID: Router-F.02-00, Length: 76 bytes, Lifetime : 1183 secs
Checksum: 0xf5ae, Sequence: 0x1, Attributes: 0x3 <L1 L2>
NLPID: 0x83, Fixed length: 27 bytes, Version: 1, Sysid length: 0 bytes
Packet type: 20, Packet version: 1, Max area: 0
TLVs:
IS neighbor: Router-F.00, Internal, Metric: default 0
IS neighbor: Router-E.00, Internal, Metric: default 0
IS extended neighbor: Router-F.00, Metric: default 0
IS extended neighbor: Router-E.00, Metric: default 0
No queued transmissions

486

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis hostname


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description

Syntax on page 487


Syntax (EX Series Switches and QFX Series) on page 487
show isis hostname
<logical-system (all | logical-system-name)>
show isis hostname

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display IS-IS hostname database information.
This command displays the system ID-to-name cache. The output shows if the mapping
has been learned by receipt of a Hostname TLV #137 (type dynamic) configured in Junos
OS with the set system host-name command, or a static mapping defined in Junos OS
with the set system static-host-mapping hostname sysid command (type static). The
local router always has its type set to static even if static-host-mapping is not configured.

Options

noneDisplay IS-IS hostname database information.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output
Output Fields

view

show isis hostname on page 488


Table 21 on page 487 describes the output fields for the show isis hostname command.
Output fields are listed in the approximate order in which they appear.

Table 21: show isis hostname Output Fields


Field Name

Field Description

System Id

System identifier mapped to the hostname.

Hostname

Hostname mapped to the system identifier.

Type

Type of mapping between system identifier and hostname.

DynamicHostname mapping determined as described in

RFC 2763, Dynamic Hostname Exchange Mechanism for IS-IS.

Copyright 2015, Juniper Networks, Inc.

StaticHostname mapping configured by user.

487

IS-IS Feature Guide for Routing Devices

Sample Output
show isis hostname
user@host> show isis hostname
IS-IS hostname database:
System Id
Hostname
1921.6800.4201 isis1
1921.6800.4202 isis2
1921.6800.4203 isis3

488

Type
Dynamic
Static
Dynamic

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis interface


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description

Syntax on page 489


Syntax (EX Series Switches and QFX Series) on page 489
show isis interface
<brief | detail | extensive>
<interface-name>
<logical-system (all | logical-system-name)>
show isis interface
<brief | detail | extensive>
<interface-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Display status information about IS-IS-enabled interfaces.

NOTE: If the configured metric for an IS-IS level is above 63, and the
wide-metrics-only statement is not configured, the show isis interface detail
command and the show isis interface extensive command display 63 as the
metric value for that level. Configure the wide-metrics-only statement to
generate metric values greater than 63 on a per IS-IS level basis.
The show isis interface command displays the configured metric value for an
IS-IS level irrespective of whether is configured or not.

Options

noneDisplay standard information about all IS-IS-enabled interfaces.


brief | detail | extensive(Optional) Display the specified level of output.
interface-name(Optional) Display information about the specified interface only.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output

view

Understanding Wide IS-IS Metrics for Traffic Engineering on page 213

Example: Enabling Wide IS-IS Metrics for Traffic Engineering on page 213

show isis interface on page 492


show isis interface brief on page 492
show isis interface detail on page 492

Copyright 2015, Juniper Networks, Inc.

489

IS-IS Feature Guide for Routing Devices

show isis interface extensive on page 492


Output Fields

Table 22 on page 490 describes the output fields for the show isis interface command.
Output fields are listed in the approximate order in which they appear.

Table 22: show isis interface Output Fields


Field Name

Field Description

Level of Output

interface-name

Name of the interface.

detail

Designated router

Routing device selected by other routers that is responsible for sending link-state
advertisements that describe the network. Used only on broadcast networks.

detail

Index

Interface index assigned by the Junos OS kernel.

detail

State

Internal implementation information.

detail

Circuit id

Circuit identifier.

detail

NOTE: Each IS-IS interface is assigned a circuit ID value to identify the interface
within the linkstate database. All interfaces (loopback, broadcast, and so on)
and all point-to-point links share the locally significant value of 0x01, and this
value is not incremented.
Circuit type

Circuit type:

1Level 1 only

2Level 2 only

3Level 1 and Level 2

detail

LSP interval

Interval between link-state PDUs sent from the interface.

detail

CSNP interval

Interval between complete sequence number PDUs sent from the interface.

detail extensive

Sysid

System identifier.

detail

Interface

Interface through which the adjacency is made.

none brief

L or Level

Level:

All levels

1Level 1 only

2Level 2 only

3Level 1 and Level 2

NOTE: The default IS-IS level on loopback interfaces are always same as the
IS-IS level configured on other IS-IS interfaces in a router. You can also configure
IS-IS level on loopback interfaces per your requirement.
CirID

Circuit identifier.

none brief

Level 1 DR

Level 1 designated intermediate system.

none brief

Level 2 DR

Level 2 designated intermediate system.

none brief

490

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 22: show isis interface Output Fields (continued)


Field Name

Field Description

Level of Output

L1/L2 Metric

Interface's metric for Level 1 and Level 2. If there is no information, the metric
is 0.

none brief

Adjacency
advertisement:
Advertise

This routing device has signaled to advertise this interface to its neighbors in
their label-switched paths (LSPs).

detail extensive

Adjacency
advertisement:
Suppress

This neighbor has signaled not to advertise this interface in the routing devices
outbound LSPs.

detail extensive

Adjacencies

Number of adjacencies established on this interface.

detail

Priority

Priority value for this interface.

detail

Metric

Metric value for this interface.

detail

Hello(s) / Hello
Interval

Interface's hello interval.

detail extensive

Hold(s) / Hold Time

Interface's hold time.

detail extensive

Designated Router

Router responsible for sending network link-state advertisements, which describe


all the routing devices attached to the network.

detail

Hello padding

Type of hello padding:

extensive

AdaptiveOn point-to-point connections, the hello packets are padded from

the initial detection of a new neighbor until the neighbor verifies the adjacency
as Up in the adjacency state TLV. If the neighbor does not support the
adjacency state TLV, then padding continues. On LAN connections, padding
starts from the initial detection of a new neighbor until there is at least one
active adjacency on the interface.

Loose(Default) The hello packet is padded from the initial detection of a

new neighbor until the adjacency transitions to the Up state.

StrictPadding is performed on all interface types and for all adjacency

states, and is continuous.


LDP sync state

Current LDP synchronization state: in sync, in holddown, or not supported.

extensive

reason

Reason for being in the LDP sync state.

extensive

config holdtime

Configured value of the hold timer.

extensive

remaining

If the state is not in sync and the hold time is not infinity, then this field displays
the remaining hold time in seconds.

extensive

Copyright 2015, Juniper Networks, Inc.

491

IS-IS Feature Guide for Routing Devices

Sample Output
show isis interface
user@host> show isis interface
IS-IS interface database:
Interface
L CirID Level 1 DR
at-2/3/0.0
3
0x1 Point to Point
lo0.0
3
0x1 Passive

Level 2 DR
Point to Point
Passive

L1/L2 Metric
10/10
0/0

show isis interface brief


The output for the show isis interface brief command is identical to that for the show isis
interface command. For sample output, see show isis interface on page 492.
show isis interface detail
user@host> show isis interface detail
IS-IS interface database:
at-2/3/0.0
Index: 66, State: 0x6, Circuit id: 0x1, Circuit type: 3
LSP interval: 100 ms, CSNP interval: 5 s
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1
1
64
10
9.000
27
2
1
64
10
9.000
27
lo0.0
Index: 64, State: 0x6, Circuit id: 0x1, Circuit type: 0
LSP interval: 100 ms, CSNP interval: disabled
Adjacency advertisement: Advertise
Protection Type: Node Link, No eligible Backup
Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router
1
0
64
0 Passive
2
0
64
0 Passive

show isis interface extensive


user@host> show isis interface extensive
IS-IS interface database:
xe-6/1/0.0
Index: 75, State: 0x6, Circuit id: 0x1, Circuit type: 2
LSP interval: 100 ms, CSNP interval: 10 s, Loose Hello padding
Adjacency advertisement: Advertise
Level 1
Adjacencies: 0, Priority: 64, Metric: 10
Disabled
Level 2
Adjacencies: 1, Priority: 64, Metric: 10
Hello Interval: 20.000 s, Hold Time: 60 s
Designated Router: nemean.03

492

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis overview


Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description
Options

show isis overview


<instance instance-name>
<logical-system (all | logical-system-name)>
show isis overview
<instance instance-name>

Command introduced in Junos OS Release 8.5.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display IS-IS overview information.
noneDisplay standard overview information about IS-IS for all routing instances.
instance instance-name(Optional) Display overview information for the specified routing

instance.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output
Output Fields

view

show isis overview on page 495


Table 23 on page 493 lists the output fields for the show isis overview command. Output
fields are listed in the approximate order in which they appear.

Table 23: show isis overview Output Fields


Field Name

Field Description

Hostname

Name of the router.

Sysid

Part of the ISO address of the routing device.

Areaid

The area number of the routing device.

Instance

IS-IS routing instance.

Router ID

Router ID of the routing device.

Adjacency holddown

Adjacency holddown capability: enabled or disabled.

Maximum Areas

Maximum number of IS-IS areas advertised by the routing device.

LSP life time

Lifetime of the link-state PDU, in seconds.

Copyright 2015, Juniper Networks, Inc.

493

IS-IS Feature Guide for Routing Devices

Table 23: show isis overview Output Fields (continued)


Field Name

Field Description

Attached bit evaluation

Attached bit capability: enabled or disabled.

SPF delay

Delay before performing consecutive shortest-path-first (SPF) calculations.

SPF holddown

Delay before performing additional SPF calculations after the maximum number of consecutive SPF
calculations is reached.

SPF rapid runs

Maximum number of SPF calculations that can be performed in succession before the holddown timer
begins.

Overload bit at startup


is set

Overload bit capability is enabled.

Overload high metrics

Overload high metrics capability: enabled or disabled.

Overload timeout

Time period after which overload is reset and the time that remains before the timer is set to expire.

Traffic engineering

Traffic engineering capability: enabled or disabled.

Restart

Graceful restart capability: enabled or disabled.

Restart duration

Time period for complete reacquisition of IS-IS neighbors.

Helper mode

Graceful restart helper capability: enabled or disabled.

Level

IS-IS level:

1Level 1 information

2Level 2 information

IPv4 is enabled

IP Protocol version 4 capability is enabled.

IPv6 is enabled

IP Protocol version 6 capability is enabled.

Internal route
preference

Preference value of internal routes.

External route
preference

Preference value of external routes.

Prefix export limit

Number of prefixes allowed to be exported, as configured by the prefix-export-limit statement.

Prefix export count

Number of prefixes exported.

Wide area metrics are


enabled

Wide area metrics capability is enabled.

494

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 23: show isis overview Output Fields (continued)


Field Name

Field Description

Narrow metrics are


enabled

Narrow metrics capability is enabled.

Adjacency holddown is
active

IS-IS adjacencies come up one after another when adjacency holddown is enabled.

Sample Output
show isis overview
user@host> show isis overview
Instance: master
Router ID: 10.255.107.183
Hostname: pro-bng3-a
Sysid: 0192.0168.0001
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Wide metrics are enabled, Narrow metrics are enabled
Adjacency holddown is active
Level 2
Internal route preference: 18
External route preference: 165
Prefix export limit: 5, Prefix export count: 5
Wide metrics are enabled
Adjacency holddown is active
user@host> show isis overview logical-system R2
Instance: master
Router ID: 192.168.0.2
Hostname: pro-bng3-a-R2
Sysid: 0192.0168.0002
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160

Copyright 2015, Juniper Networks, Inc.

495

IS-IS Feature Guide for Routing Devices

Prefix export count: 0


Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
user@host> show isis overview logical-system R3
Instance: master
Router ID: 192.168.0.3
Hostname: pro-bng3-a-R3
Sysid: 0192.0168.0003
Areaid: 49.0002
Adjacency holddown: enabled
Maximum Areas: 3
LSP life time: 1200
Attached bit evaluation: enabled
SPF delay: 200 msec, SPF holddown: 5000 msec, SPF rapid runs: 3
IPv4 is enabled, IPv6 is enabled
Traffic engineering: enabled
Restart: Disabled
Helper mode: Enabled
Level 1
Internal route preference: 15
External route preference: 160
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled
Level 2
Internal route preference: 18
External route preference: 165
Prefix export count: 0
Wide metrics are enabled, Narrow metrics are enabled

496

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis route


List of Syntax

Syntax on page 497


Syntax (EX Series Switches and QFX Series) on page 497

Syntax

show isis route


<destination>
<inet | inet6>
<instance instance-name>
<logical-system (all | logical-system-name)>
<topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)>

Syntax (EX Series


Switches and QFX
Series)

show isis route


<destination>
<inet | inet6>
<instance instance-name>
<topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)>

Release Information

Description
Options

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display the routes in the IS-IS routing table.
noneDisplay all routes in the IS-IS routing table for all supported address families for

all routing instances.


destination(Optional) Destination address for the route.
inet | inet6(Optional) Display inet (IPv4) or inet6 (IPv6) routes, respectively.
instance instance-name(Optional) Display routes for the specified routing instance only.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)(Optional) Display

routes for the specified topology only, or use unicast to display information, if
available, for both IPv4 and IPv6 unicast topologies.
Required Privilege
Level
List of Sample Output

Output Fields

view

show isis route logical-system on page 498


show isis route (CLNS) on page 498
show isis route on page 499
Table 24 on page 498 describes the output fields for the show isis route command. Output
fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

497

IS-IS Feature Guide for Routing Devices

Table 24: show isis route Output Fields


Field Name

Field Description

Current version

Number of the current version of the IS-IS routing table.

L1

Version of Level 1 SPF that was run.

L2

Version of Level 2 SPF that was run.

Prefix

Destination of the route.

IS-IS level:

1Level 1 only

2Level 2 only

3Level 1 and Level 2

Version

Version of SPF that generated the route.

Metric

Metric value associated with the route.

Type

Metric type: int (internal) or ext (external).

Interface

Interface to the next hop.

Via

System identifier of the next hop, displayed as a name if possible.

ISO Routes

ISO routing table entries.

snpa

MAC address.

Sample Output
show isis route logical-system
user@host> show isis route logical-system ls1
IS-IS routing table
Current version: L1: 8 L2: 11
Prefix
L Version Metric Type Interface
Via
10.9.7.0/30
2
11
20 int gr-0/2/0.0
h
10.9.201.1/32
2
11
60 int gr-0/2/0.0
h
IPV6 Unicast IS-IS routing table
Current version: L1: 9 L2: 11
Prefix
L Version Metric Type Interface
Via
8009:3::a09:3200/126 2
11
20 int gr-0/2/0.0 h

show isis route (CLNS)


user@host> show isis route
IS-IS routing table
Current version: L1: 10 L2: 8
IPv4/IPv6 Routes
Prefix
L Version
Metric Type Interface
Via
0.0.0.0/0
1
10
10 int fe-0/0/1.0
ISIS.0
ISO Routes
Prefix L
Version
Metric Type Interface
Via
snpa

498

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

0/0
1
10
10 int fe-0/0/1.0
isis.0 0:12:0:34:0:56
47.0005.80ff.f800.0000.0108.0001/104
1
10
0 int
47.0005.80ff.f800.0000.0108.0001.1921.6800.4001/152
1
10
10 int fe-0/0/1.0 isis.0 0:12:0:34:0:56
47.0005.80ff.f800.0000.0108.0001.1921.6800.4002/152
1
10
20 int fe-0/0/1.0 isis.0 0:12:0:34:0:56
47.0005.80ff.f800.0000.0108.0002/104
1
10
0 int
47.0005.80ff.f800.0000.0108.0002.1921.6800.4001/152
1
10
10 int fe-0/0/1.0 isis.0 0:12:0:34:0:56

show isis route


user@host> show isis route
IS-IS routing table
IPv4/IPv6 Routes
---------------Prefix
10.255.71.52/32

L
2

Version
13

10.255.71.238/32

13

10.255.71.239/32

Current version: L1: 4 L2: 13

13

Metric Type Interface


10
int ae0.0
20

20

int

int

NH
Via
IPV4 camaro

so-6/0/0.0

IPV4 olympic

as0.0

IPV4 glacier

so-6/0/0.0

IPV4 olympic

ae0.0

IPV4 camaro

10.255.71.242/32

13

10

int

as0.0

IPV4 glacier

10.255.71.243/32

13

10

int

so-6/0/0.0

IPV4 olympic

12.13.0.0/30

13

20

int

so-6/0/0.0

IPV4 olympic

12.15.0.0/30

13

20

int

so-6/0/0.0

IPV4 olympic

13.15.0.0/30

13

30

int

ae0.0

IPV4 camaro

so-6/0/0.0

IPV4 olympic

as0.0

IPV4 glacier

13.16.0.0/30

13

25

int

as0.0

IPV4 glacier

14.15.0.0/30

13

20

int

ae0.0

IPV4 camaro

192.2.1.0/30

13

30

int

so-6/0/0.0

IPV4 olympic

as0.0

IPV4 glacier

so-6/0/0.0

IPV6 olympic

as0.0

IPV6 glacier

1eee::/64

13

30

int

abcd::10:255:71:52/128

13

10

int

ae0.0

IPV6 camaro

abcd::10:255:71:238/128

13

20

int

so-6/0/0.0

IPV6 olympic

Copyright 2015, Juniper Networks, Inc.

499

IS-IS Feature Guide for Routing Devices

abcd::10:255:71:239/128

500

13

20

int

as0.0

IPV6 glacier

so-6/0/0.0

IPV6 olympic

ae0.0

IPV6 camaro

abcd::10:255:71:242/128

13

10

int

as0.0

IPV6 glacier

abcd::10:255:71:243/128

13

10

int

so-6/0/0.0

IPV6 olympic

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show isis spf


List of Syntax

Syntax on page 501


Syntax (EX Series Switches) on page 501

Syntax

show isis spf (brief | log | results)


<instance instance-name>
<level (1 | 2)>
<logical-system (all | logical-system-name)>
<topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)>

Syntax (EX Series


Switches)

show isis spf (brief | log | results)


<instance instance-name>
<level (1 | 2)>
<topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)>

Release Information

Description
Options

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display information about IS-IS shortest-path-first (SPF) calculations.
briefDisplay an overview of SPF calculations.
instance instance instance-name(Optional) Display SPF calculations for the specified

routing instance.
level (1 | 2)(Optional) Display SPF calculations for the specified IS-IS level.
logDisplay the log of SPF calculations.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


resultsDisplay the results of SPF calculations.
topology (ipv4-multicast | ipv6-multicast | ipv6-unicast | unicast)(Optional) Display

SPF calculations for the specified topology only.


Required Privilege
Level
List of Sample Output

Output Fields

view

show isis spf log on page 502


show isis spf results logical-system on page 503
show isis spf results (CLNS) on page 504
Table 25 on page 501 describes the output fields for the show isis spf command. Output
fields are listed in the approximate order in which they appear.

Table 25: show isis spf Output Fields


Field Name

Field Description

Node

System ID of a node.

Copyright 2015, Juniper Networks, Inc.

501

IS-IS Feature Guide for Routing Devices

Table 25: show isis spf Output Fields (continued)


Field Name

Field Description

Metric

Metric to the node.

Interface

Interface of the next hop.

Via

System ID of the next hop.

SNPA

Subnetwork point of attachment (MAC address of the next hop).

Start time

(log option only) Time that the SPF computation started.

Elapsed (secs)

(log option only) Length of time, in seconds, required to complete


the SPF computation.

Count

(log option only) Number of times the SPF was triggered.

Reason

(log option only) Reason that the SPF computation was completed.

Sample Output
show isis spf log
user@host> show isis spf log logical-system lsl
IS-IS level 1 SPF log:
Start time
Elapsed (secs) Count
Fri Oct 31 12:41:18
0.000069
1
Fri Oct 31 12:41:18
0.000107
3
Fri Oct 31 12:41:18
0.000050
3
Fri Oct 31 12:41:23
0.000033
1
Fri Oct 31 12:41:28
0.000178
5
Fri Oct 31 12:41:59
0.000060
1
Fri Oct 31 12:42:30
0.000161
2
Fri Oct 31 12:56:58
0.000198
1
Fri Oct 31 13:10:29
0.000209
1
IS-IS level 2 SPF log:
Start time
Elapsed (secs) Count
Fri Oct 31 12:41:18
0.000035
1
Fri Oct 31 12:41:18
0.000047
2
Fri Oct 31 12:41:18
0.000043
5
Fri Oct 31 12:41:23
0.000022
1
Fri Oct 31 12:41:59
0.000144
3
Fri Oct 31 12:42:30
0.000257
3
Fri Oct 31 12:54:37
0.000195
1
Fri Oct 31 12:55:50
0.000178
1
Fri Oct 31 12:55:55
0.000174
1
Fri Oct 31 12:55:58
0.000176
1
Fri Oct 31 13:08:14
0.000198
1
IPV6 Unicast IS-IS level 1 SPF log:

Reason
Reconfig
Updated LSP fix.00-00
Address change on so-1/2/2.0
Updated LSP fix.00-00
New adjacency scat on ge-1/1/0.0
Updated LSP fix.00-00
Multi area attachment change
Periodic SPF
Periodic SPF

Reason
Reconfig
Updated LSP fix.00-00
Address change on gr-0/2/0.0
Updated LSP fix.00-00
New adjacency h on gr-0/2/0.0
New LSP skag.00-00
Periodic SPF
Updated LSP fix.00-00
Updated LSP h.00-00
Updated LSP skag.00-00
Periodic SPF

Start time
Elapsed (secs) Count Reason
Fri Oct 31 12:41:18
0.000028
1 Reconfig
Fri Oct 31 12:41:18
0.000043
3 Updated LSP fix.00-00

502

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Fri Oct 31 12:41:18


Fri Oct 31 12:41:23
Fri Oct 31 12:41:25
Fri Oct 31 12:41:28
Fri Oct 31 12:41:59
Fri Oct 31 12:42:30
Fri Oct 31 12:56:08
Fri Oct 31 13:11:07
IPV6 Unicast IS-IS level 2
Start time
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
Fri Oct 31
...

12:41:18
12:41:18
12:41:18
12:41:23
12:41:25
12:41:59
12:42:30
12:55:50
12:55:55
12:55:58
13:09:46

0.000112
0.000059
0.000041
0.000103
0.000040
0.000118
0.000289
0.000214
SPF log:

4
1
1
5
1
2
1
1

Elapsed (secs) Count


0.000027
1
0.000039
2
0.000049
6
0.000025
1
0.000023
1
0.000087
3
0.000123
3
0.000121
1
0.000121
1
0.000121
1
0.000201
1

Updated LSP fix.00-00


Updated LSP fix.00-00
Updated LSP fix.00-00
New adjacency scat on ge-1/1/0.0
Updated LSP fix.00-00
Multi area attachment change
Periodic SPF
Periodic SPF

Reason
Reconfig
Updated LSP fix.00-00
Updated LSP fix.00-00
Updated LSP fix.00-00
Updated LSP fix.00-00
New adjacency h on gr-0/2/0.0
New LSP skag.00-00
Updated LSP fix.00-00
Updated LSP h.00-00
Updated LSP skag.00-00
Periodic SPF

show isis spf results logical-system


user@host> show isis spf results logical-system ls1
IS-IS level 1 SPF results:
Node
Metric
Interface
scat.00
10
ge-1/1/0.0
20
10.9.1.0/30
fix.02
10
fix.00
0
10
10.9.1.0/30
10
10.9.5.0/30
10
10.9.6.0/30
20
10.9.7.0/30
60
10.9.201.1/32
3 nodes
IS-IS level 2 SPF results:
Node
Metric
skag.00
20
30
skag.02
20
h.00
10
20
20
60
fix.00
0
10
10
10
4 nodes

Interface
gr-0/2/0.0
10.9.7.0/30
gr-0/2/0.0
gr-0/2/0.0
10.9.6.0/30
10.9.7.0/30
10.9.201.1/32

Via
scat

Via

SNPA

h
h
h

10.9.1.0/30
10.9.5.0/30
10.9.6.0/30

IPV6 Unicast IS-IS level 1 SPF results:


Node
Metric
Interface
Via
scat.00
10
ge-1/1/0.0
scat
ge-1/1/0.0
scat
20
8009:1::a09:1400/126
fix.02
10

Copyright 2015, Juniper Networks, Inc.

SNPA
0:90:69:a6:48:9d

SNPA
0:90:69:a6:48:9d
0:90:69:a6:48:9d

503

IS-IS Feature Guide for Routing Devices

fix.00

0
10
10
20
10

8009:1::a09:1400/126
8009:2::a09:1e00/126
8009:3::a09:3200/126
8009:4::a09:2800/126

3 nodes
IPV6 Unicast IS-IS level 2 SPF results:
Node
Metric
Interface
Via
skag.00
20
gr-0/2/0.0
h
gr-0/2/0.0
h
30
8009:3::a09:3200/126
skag.02
20
gr-0/2/0.0
h
gr-0/2/0.0
h
h.00
10
gr-0/2/0.0
h
gr-0/2/0.0
h
20
8009:3::a09:3200/126
20
8009:4::a09:2800/126
fix.00
0
10
8009:1::a09:1400/126
10
8009:2::a09:1e00/126
10
8009:4::a09:2800/126
4 nodes
Multicast IS-IS level 1 SPF results:
Node
Metric
Interface
scat.00
10
ge-1/1/0.0
fix.02
10
fix.00
0
3 nodes
Multicast IS-IS level 2 SPF results:
Node
Metric
Interface
skag.00
20
gr-0/2/0.0
skag.02
20
gr-0/2/0.0
h.00
10
gr-0/2/0.0
fix.00
0
4 nodes
...

SNPA

Via
scat

SNPA
0:90:69:a6:48:9d

Via

SNPA

h
h
h

show isis spf results (CLNS)


user@host> show isis spf results
IS-IS level 1 SPF results:
Node
Metric
Interface
Via
skag.00 10
fe-0/0/1.0
toothache
fe-0/0/1.0
toothache
20
192.168.37.64/29
10
1921.6800.4001
20
1921.6800.4002
pro1-a.02
10
pro1-a.00
0
0
10.255.245.1/32
10
192.168.37.64/29
0
1921.6800.4211
3 nodes
IS-IS level 2 SPF results:
Node
Metric
skag.00 10

504

Interface
fe-0/0/1.0
fe-0/0/1.0

Via
toothache
toothache

SNPA
0:12:0:34:0:56
0:12:0:34:0:56

SNPA
0:12:0:34:0:56
0:12:0:34:0:56

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

pro1-a.02
pro1-a.00

20
20
20
10
0
0
10

10.255.245.1/32
192.168.37.64/29
47.0005.80ff.f800.0000.0109.0010/104

10.255.245.1/32
192.168.37.64/29

3 nodes

Copyright 2015, Juniper Networks, Inc.

505

IS-IS Feature Guide for Routing Devices

show isis statistics


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)
Release Information

Description
Options

Syntax on page 506


Syntax (EX Series Switches and QFX Series) on page 506
show isis statistics
<instance instance-name>
<logical-system (all | logical-system-name)>
show isis statistics
<instance instance-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 12.1 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display statistics about IS-IS traffic.
noneDisplay IS-IS traffic statistics for all routing instances.
instance instance-name(Optional) Display statistics for the specified routing instance.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields

506

view

clear isis statistics on page 427

show isis statistics on page 508


Table 26 on page 507 describes the output fields for the show isis statistics command.
Output fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 26: show isis statistics Output Fields


Field Name

Field Description

PDU type

PDU type:

CSNPComplete sequence number PDUs contain a complete list of all link-state PDUs in the IS-IS

database. CSNPs are sent periodically on all links, and the receiving systems use the information
in the CSNP to update and synchronize their link-state PDU databases. The designated router
multicasts CSNPs on broadcast links in place of sending explicit acknowledgments for each
link-state PDU.

IIHIS-IS hello packets are broadcast to discover the identity of neighboring IS-IS systems and to

determine whether the neighbors are Level 1 or Level 2 intermediate systems.

LSPLink-state PDUs contain information about the state of adjacencies to neighboring IS-IS

systems. Link-state PDUs are flooded periodically throughout an area.

PSNPPartial sequence number PDUs are sent multicast by a receiver when it detects that it is

missing a link-state PDU (when its link-state PDU database is out of date). The receiver sends a
PSNP to the system that transmitted the CSNP, effectively requesting that the missing link-state
PDU be transmitted. That routing device, in turn, forwards the missing link-state PDU to the
requesting routing device.

UnknownThe PDU type is unknown.

Received

Number of PDUs received since IS-IS started or since the statistics were set to zero.

Processed

Number of PDUs received less the number dropped.

Drops

Number of PDUs dropped.

Sent

Number of PDUs transmitted since IS-IS started or since the statistics were set to zero.

Rexmit

Number of PDUs retransmitted since IS-IS started or since the statistics were set to zero.

Total packets
received/sent

Total number of PDUs received and transmitted since IS-IS started or since the statistics were set to
zero.

SNP queue length

Number of CSPN and PSNP packets currently waiting in the queue for processing. This value is almost
always 0.

LSP queue length

Number of link-state PDUs waiting in the queue for processing. This value is almost always 0.

SPF runs

Number of shortest-path-first (SPF) calculations that have been performed. If this number is
incrementing rapidly, it indicates that the network is unstable.

Fragments rebuilt

Number of link-state PDU fragments that the local system has computed.

LSP regenerations

Number of link-state PDUs that have been regenerated. A link-state PDU is regenerated when it is
nearing the end of its lifetime and it has not changed.

Purges initiated

Number of purges that the system initiated. A purge is initiated if the software decides that a link-state
PDU must be removed from the network.

Copyright 2015, Juniper Networks, Inc.

507

IS-IS Feature Guide for Routing Devices

Sample Output
show isis statistics
user@host> show isis statistics
IS-IS statistics for merino:
PDU type
LSP
IIH
CSNP
PSNP
Unknown
Totals

Received
12227
113808
198868
6985
0
331888

Processed
12227
113808
198868
6979
0
331882

Drops
0
0
0
6
0
6

Sent
8184
115817
198934
8274
0
331209

Rexmit
683
0
0
0
0
683

Total packets received: 331888 Sent: 331892


SNP queue length:
LSP queue length:
SPF runs:
Fragments rebuilt:
LSP regenerations:
Purges initiated:

508

0 Drops:
0 Drops:

0
0

1014
1038
425
0

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show policy
List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description
Options

Syntax on page 509


Syntax (EX Series Switches) on page 509
show policy
<logical-system (all | logical-system-name)>
<policy-name>
show policy
<policy-name>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display information about configured routing policies.
noneList the names of all configured routing policies.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


policy-name(Optional) Show the contents of the specified policy.

Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

view

show policy damping

show policy on page 510


show policy policy-name on page 510
show policy (Multicast Scoping) on page 510
Table 27 on page 509 lists the output fields for the show policy command. Output fields
are listed in the approximate order in which they appear.

Table 27: show policy Output Fields


Field Name

Field Description

policy-name

Name of the policy listed.

term

Policy term listed.

from

Match condition for the policy.

then

Action for the policy.

Copyright 2015, Juniper Networks, Inc.

509

IS-IS Feature Guide for Routing Devices

Sample Output
show policy
user@host> show policy
Configured policies:
__vrf-export-red-internal__
__vrf-import-red-internal__
red-export
all_routes

show policy policy-name


user@host> show policy test-statics
Policy test-statics:
from
3.0.0.0/8 accept
3.1.0.0/16 accept
then reject

show policy (Multicast Scoping)


user@host> show policy test-statics
Policy test-statics:
from
multicast-scoping == 8

510

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show policy conditions


Syntax

Syntax (EX Series


Switches)

Release Information

Description

Options

show policy conditions


<condition-name>
<detail>
<dynamic>
<logical-system (all | logical-system-name)>
show policy conditions
<condition-name>
<detail>
<dynamic>

Command introduced in Junos OS Release 9.0.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display all the configured conditions as well as the routing tables with which the
configuration manager is interacting. If the detail keyword is included, the output also
displays dependent routes for each condition.
noneDisplay all configured conditions and associated routing tables.
condition-name(Optional) Display information about the specified condition only.
detail(Optional) Display the specified level of output.
dynamic(Optional) Display information about the conditions in the dynamic database.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output
Output Fields

view

show policy conditions detail on page 512


Table 28 on page 511 lists the output fields for the show policy conditions command.
Output fields are listed in the approximate order in which they appear.

Table 28: show policy conditions Output Fields


Field Name

Field Description

Level of Output

Condition

Name of configured condition.

All levels

event

Condition type. If the if-route-exists option is configured, the event type is:
Existence of a route in a specific routing table.

All levels

Dependent routes

List of routes dependent on the condition, along with the latest generation
number.

detail

Condition tables

List of routing tables associated with the condition, along with the latest
generation number and number of dependencies.

All levels

Copyright 2015, Juniper Networks, Inc.

511

IS-IS Feature Guide for Routing Devices

Table 28: show policy conditions Output Fields (continued)


Field Name

Field Description

Level of Output

If-route-exists
conditions

List of conditions configured to look for a route in the specified table.

All levels

Sample Output
show policy conditions detail
user@host> show policy conditions detail
Configured conditions:
Condition primary (static), event: Existence of a route in a specific routing
table
Dependent routes:
8.41.0.0/24, generation 18
Condition standby (static), event: Existence of a route in a specific routing
table
Dependent routes:
8.41.0.0/24, generation 18
Condition tables:
Table mpls.0, generation 0, dependencies 0, If-route-exists conditions: primary
(static) standby (static)
Table l3vpn.inet.0, generation 633, dependencies 2

512

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route
List of Syntax

Syntax

Syntax (EX Series


Switches)

Release Information

Description
Options

Syntax on page 513


Syntax (EX Series Switches) on page 513
show route
<all>
<destination-prefix>
<logical-system (all | logical-system-name)>
<private>
show route
<all>
<destination-prefix>
<private>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Option private introduced in Junos OS Release 9.5.
Option private introduced in Junos OS Release 9.5 for EX Series switches.
Command introduced in Junos OS Release 15.1 on MX Series routers for enhanced
subscriber management.
Display the active entries in the routing tables.
noneDisplay brief information about all active entries in the routing tables.
all(Optional) Display information about all routing tables, including private, or internal,

routing tables.
destination-prefix(Optional) Display active entries for the specified address or range

of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


private(Optional) Display information only about all private, or internal, routing tables.

Required Privilege
Level
Related
Documentation

view

Example: Configuring RIP

Example: Configuring RIPng

Example: Configuring IS-IS

Examples: Configuring Internal BGP Peering

Examples: Configuring External BGP Peering

Examples: Configuring OSPF Routing Policy

Copyright 2015, Juniper Networks, Inc.

513

IS-IS Feature Guide for Routing Devices

List of Sample Output

show route on page 516


show route on page 517
show route (with Destination Prefix) on page 517
show route destination-prefix detail on page 517
show route extensive on page 518
show route (Enhanced Subscriber Management) on page 518

Output Fields

Table 29 on page 514 describes the output fields for the show route command. Output
fields are listed in the approximate order in which they appear.

Table 29: show route Output Fields


Field Name

Field Description

routing-table-name

Name of the routing table (for example, inet.0).

number destinations

Number of destinations for which there are routes in the routing table.

number routes

Number of routes in the routing table and total number of routes in the following states:

active (routes that are active).

holddown (routes that are in the pending state before being declared inactive). A holddown route

was once the active route and is no longer the active route. The route is in the holddown state
because a protocol still has interest in the route, meaning that the interest bit is set. A protocol
might have its interest bit set on the previously active route because the protocol is still advertising
the route. The route will be deleted after all protocols withdraw their advertisement of the route
and remove their interest bit. A persistent holddown state often means that the interested protocol
is not releasing its interest bit properly.
However, if you have configured advertisement of multiple routes (with the add-path or
advertise-inactive statement), the holddown bit is most likely set because BGP is advertising the
route as an active route. In this case, you can ignore the holddown state because nothing is wrong.

destination-prefix

hidden (routes that are not used because of a routing policy).

Route destination (for example:10.0.0.1/24). Sometimes the route information is presented in another
format, such as:

MPLS-label (for example, 80001).

interface-name (for example, ge-1/0/2).

neighbor-address:control-word-status:encapsulation type:vc-id :source (Layer 2 circuit only. For example,

10.1.1.195:NoCtrlWord:1:1:Local/96):

neighbor-addressAddress of the neighbor.

control-word-statusWhether the use of the control word has been negotiated for this virtual
circuit: NoCtrlWord or CtrlWord.

encapsulation typeType of encapsulation, represented by a number: (1) Frame Relay DLCI, (2)

ATM AAL5 VCC transport, (3) ATM transparent cell transport, (4) Ethernet, (5) VLAN Ethernet,
(6) HDLC, (7) PPP, (8) ATM VCC cell transport, (10) ATM VPC cell transport.

514

vc-idVirtual circuit identifier.

sourceSource of the advertisement: Local or Remote.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 29: show route Output Fields (continued)


Field Name

Field Description

[ protocol, preference ]

Protocol from which the route was learned and the preference value for the route.

+A plus sign indicates the active route, which is the route installed from the routing table into the

forwarding table.

- A hyphen indicates the last active route.

*An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.

In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
weeks:days
hours:minutes:seconds

How long the route been known (for example, 2w4d 13:11:14, or 2 weeks, 4 days, 13 hours, 11 minutes,
and 14 seconds).

metric

Cost value of the indicated route. For routes within an AS, the cost is determined by the IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.

localpref

Local preference value included in the route.

from

Interface from which the route was received.

AS path

AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:

IIGP.

EEGP.

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the local AS number associated with the AS path if more than one AS number

is configured on the routing device, or if AS path prepending is configured.

{ }Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.

A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.

Copyright 2015, Juniper Networks, Inc.

515

IS-IS Feature Guide for Routing Devices

Table 29: show route Output Fields (continued)


Field Name

Field Description

validation-state

(BGP-learned routes) Validation status of the route:

InvalidIndicates that the prefix is found, but either the corresponding AS received from the EBGP

peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.

UnknownIndicates that the prefix is not among the prefixes or prefix ranges in the database.

UnverifiedIndicates that the origin of the prefix is not verified against the database. This is because

the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.

to

ValidIndicates that the prefix and autonomous system pair are found in the database.

Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.
If the destination is Discard, traffic is dropped.

via

Interface used to reach the next hop. If there is more than one interface available to the next hop, the
interface that is actually used is followed by the word Selected. This field can also contain the following
information:

WeightValue used to distinguish primary, secondary, and fast reroute backup routes. Weight

information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.

BalanceBalance coefficient indicating how traffic of unequal cost is distributed among next hops

when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.

lsp-path-nameName of the LSP used to reach the next hop.

label-actionMPLS label and operation occurring at the next hop. The operation can be pop (where
a label is removed from the top of the stack), push (where another label is added to the label stack),
or swap (where a label is replaced by another label). For VPNs, expect to see multiple push

operations, corresponding to the inner and outer labels required for VPN routes (in the case of a
direct PE-to-PE connection, the VPN route would have the inner label push only).
Private unicast

(Enhanced subscriber management for MX Series routers) Indicates that an access-internal route is
managed by enhanced subscriber management. By contrast, access-internal routes not managed
by enhanced subscriber management are displayed with associated next-hop and media access
control (MAC) address information.

Sample Output
show route
user@host> show route
inet.0: 11 destinations, 12 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1:65500:1:10.0.0.20/240
*[MVPN/70] 19:53:41, metric2 1
Indirect
1:65500:1:10.0.0.40/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD

516

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

[BGP/170] 19:53:26, localpref 100, from 10.0.0.33


AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
1:65500:1:10.0.0.60/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
[BGP/170] 19:53:25, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF

show route
The following sample output shows a VPN route with composite next hops enabled. The
first Push operation corresponds to the outer label. The second Push operation
corresponds to the inner label.
user@host> show route 70.0.0.0
13979:665001.inet.0: 871 destinations, 3556 routes (871 active, 0 holddown, 0
hidden)
+ = Active Route, - = Last Active, * = Both
70.0.0.0/24

@[BGP/170] 00:28:32, localpref 100, from 10.9.9.160


AS path: 13980 ?, validation-state: unverified
> to 10.100.0.42 via ae2.0, Push 16, Push 300368(top)
[BGP/170] 00:28:28, localpref 100, from 10.9.9.169
AS path: 13980 ?, validation-state: unverified
> to 10.100.0.42 via ae2.0, Push 126016, Push 300368(top)
#[Multipath/255] 00:28:28, metric2 102
> to 10.100.0.42 via ae2.0, Push 16, Push 300368(top)
to 10.100.0.42 via ae2.0, Push 16, Push 300368(top)

show route (with Destination Prefix)


user@host> show route 172.16.0.0/12
inet.0: 10 destinations, 10 routes (9 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
172.16.0.0/12

*[Static/5] 2w4d 12:54:27


> to 192.168.167.254 via fxp0.0

show route destination-prefix detail


user@host> show route 5.5.5.0 detail
inet.0: 15 destinations, 20 routes (15 active, 0 holddown, 0 hidden)
5.5.5.0/24 (2 entries, 2 announced)
*BGP
Preference: 170/-101
...
BGP-Static Preference: 4294967292
Next hop type: Discard
Address: 0x9041ae4
Next-hop reference count: 2
State: <NoReadvrt Int Ext AlwaysFlash>
Inactive reason: Route Preference
Local AS:
200
Age: 4d 1:40:40
Validation State: unverified
Task: RT

Copyright 2015, Juniper Networks, Inc.

517

IS-IS Feature Guide for Routing Devices

Announcement bits (1): 2-BGP_RT_Background


AS path: 4 5 6 I

show route extensive


user@host> show route extensive
v1.mvpn.0: 5 destinations, 8 routes (5 active, 1 holddown, 0 hidden)
1:65500:1:10.0.0.40/240 (1 entry, 1 announced)
*BGP
Preference: 170/-101
PMSI: Flags 0x0: Label[0:0:0]: PIM-SM: Sender 10.0.0.40 Group 225.1.1.1
Next hop type: Indirect
Address: 0x92455b8
Next-hop reference count: 2
Source: 10.0.0.30
Protocol next hop: 10.0.0.40
Indirect next hop: 2 no-forward
State: <Active Int Ext>
Local AS: 65500 Peer AS: 65500
Age: 3 Metric2: 1
Validation State: unverified
Task: BGP_65500.10.0.0.30+179
Announcement bits (2): 0-PIM.v1 1-mvpn global task
AS path: I (Originator) Cluster list: 10.0.0.30
AS path: Originator ID: 10.0.0.40
Communities: target:65520:100
Import Accepted
Localpref: 100
Router ID: 10.0.0.30
Primary Routing Table bgp.mvpn.0
Indirect next hops: 1
Protocol next hop: 10.0.0.40 Metric: 1
Indirect next hop: 2 no-forward
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.0.24.4 via lt-0/3/0.24 weight 0x1
10.0.0.40/32 Originating RIB: inet.3
Metric: 1
Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.0.24.4 via lt-0/3/0.24

show route (Enhanced Subscriber Management)


user@host> show route
inet.0: 41 destinations, 41 routes (40 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
100.20.0.111/32

*[Access-internal/12] 00:00:08
> to #0 10.0.0.1.93.65 via demux0.1073741824
100.20.0.112/32
*[Access-internal/12] 00:00:08
Private unicast
.
.
.

518

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route active-path


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description

Options

Syntax on page 519


Syntax (EX Series Switches) on page 519
show route active-path
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route active-path
<brief | detail | extensive | terse>

Command introduced in Junos OS Release 8.0.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display all active routes for destinations. An active route is a route that is selected as the
best path. Inactive routes are not displayed.
noneDisplay all active routes.
brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output

Output Fields

view

show route active-path on page 519


show route active-path brief on page 520
show route active-path detail on page 520
show route active-path extensive on page 521
show route active-path terse on page 523
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route active-path
user@host> show route active-path
inet.0: 7 destinations, 7 routes (6 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.70.19/32
10.255.71.50/32
100.1.2.0/24

Copyright 2015, Juniper Networks, Inc.

*[Direct/0] 21:33:52
> via lo0.0
*[IS-IS/15] 00:18:13, metric 10
> to 100.1.2.1 via so-2/1/3.0
*[Direct/0] 00:18:36
> via so-2/1/3.0

519

IS-IS Feature Guide for Routing Devices

100.1.2.2/32
192.168.64.0/21

*[Local/0] 00:18:41
Local via so-2/1/3.0
*[Direct/0] 21:33:52
> via fxp0.0
*[Local/0] 21:33:52
Local via fxp0.0

192.168.70.19/32

show route active-path brief


The output for the show route active-path brief command is identical to that for the show
route active-path command. For sample output, see show route active-path on page 519.
show route active-path detail
user@host> show route active-path detail
inet.0: 7 destinations, 7 routes (6 active, 0 holddown, 1 hidden)
10.255.70.19/32 (1 entry, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via lo0.0, selected
State: Active Int
Local AS:
200
Age: 21:37:10
Task: IF
Announcement bits (3): 2-IS-IS 5-Resolve tree 2 6-Resolve tree 3
AS path: I
10.255.71.50/32 (1 entry, 1 announced)
*IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 397
Next-hop reference count: 4
Next hop: 100.1.2.1 via so-2/1/3.0, selected
State: Active Int
Local AS:
200
Age: 21:31
Metric: 10
Task: IS-IS
Announcement bits (4): 0-KRT 2-IS-IS 5-Resolve tree 2 6-Resolve
tree 3
AS path: I
100.1.2.0/24 (1 entry, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via so-2/1/3.0, selected
State: Active Int
Local AS:
200
Age: 21:54
Task: IF
Announcement bits (3): 2-IS-IS 5-Resolve tree 2 6-Resolve tree 3
AS path: I
100.1.2.2/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local

520

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Next-hop reference count: 11


Interface: so-2/1/3.0
State: Active NoReadvrt Int
Local AS:
200
Age: 21:59
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3
AS path: I
192.168.64.0/21 (1 entry, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via fxp0.0, selected
State: Active Int
Local AS:
200
Age: 21:37:10
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3
AS path: I
192.168.70.19/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local
Next-hop reference count: 11
Interface: fxp0.0
State: Active NoReadvrt Int
Local AS:
200
Age: 21:37:10
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3
AS path: I

show route active-path extensive


user@host> show route active-path extensive
inet.0: 7 destinations, 7 routes (6 active, 0 holddown, 1 hidden)
10.255.70.19/32 (1 entry, 1 announced)
TSI:
IS-IS level 1, LSP fragment 0
IS-IS level 2, LSP fragment 0
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via lo0.0, selected
State: Active Int
Local AS:
200
Age: 21:39:47
Task: IF
Announcement bits (3): 2-IS-IS 5-Resolve tree 2 6-Resolve tree 3
AS path: I
10.255.71.50/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 10.255.71.50/32 -> {100.1.2.1}
IS-IS level 2, LSP fragment 0
*IS-IS Preference: 15
Level: 1
Next hop type: Router, Next hop index: 397

Copyright 2015, Juniper Networks, Inc.

521

IS-IS Feature Guide for Routing Devices

Next-hop reference count: 4


Next hop: 100.1.2.1 via so-2/1/3.0, selected
State: Active Int
Local AS:
200
Age: 24:08
Metric: 10
Task: IS-IS
Announcement bits (4): 0-KRT 2-IS-IS 5-Resolve tree 2 6-Resolve
tree 3
AS path: I
100.1.2.0/24 (1 entry, 1 announced)
TSI:
IS-IS level 1, LSP fragment 0
IS-IS level 2, LSP fragment 0
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via so-2/1/3.0, selected
State: Active Int
Local AS:
200
Age: 24:31
Task: IF
Announcement bits (3): 2-IS-IS 5-Resolve tree 2 6-Resolve tree 3
AS path: I
100.1.2.2/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local
Next-hop reference count: 11
Interface: so-2/1/3.0
State: Active NoReadvrt Int
Local AS:
200
Age: 24:36
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3
AS path: I
192.168.64.0/21 (1 entry, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 3
Next hop: via fxp0.0, selected
State: Active Int
Local AS:
200
Age: 21:39:47
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3
AS path: I
192.168.70.19/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local
Next-hop reference count: 11
Interface: fxp0.0
State: Active NoReadvrt Int
Local AS:
200
Age: 21:39:47
Task: IF
Announcement bits (2): 5-Resolve tree 2 6-Resolve tree 3

522

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

AS path: I

show route active-path terse


user@host> show route active-path terse
inet.0: 7 destinations, 7 routes (6 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
A
*
*
*
*
*
*

Destination
10.255.70.19/32
10.255.71.50/32
100.1.2.0/24
100.1.2.2/32
192.168.64.0/21
192.168.70.19/32

Copyright 2015, Juniper Networks, Inc.

P Prf
D
0
I 15
D
0
L
0
D
0
L
0

Metric 1
10

Metric 2

Next hop
>lo0.0
>100.1.2.1
>so-2/1/3.0
Local
>fxp0.0
Local

AS path

523

IS-IS Feature Guide for Routing Devices

show route advertising-protocol


Syntax

Release Information
Description

Options

show route advertising-protocol protocol neighbor-address


<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>

Command introduced before Junos OS Release 7.4.


Display the routing information as it has been prepared for advertisement to a particular
neighbor of a particular dynamic routing protocol.
brief | detail | extensive | terse(Optional) Display the specified level of output.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


neighbor-addressAddress of the neighboring router to which the route entry is being

transmitted.
protocolProtocol transmitting the route:

Additional Information

Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

524

bgpBorder Gateway Protocol

dvmrpDistance Vector Multicast Routing Protocol

msdpMulticast Source Discovery Protocol

pimProtocol Independent Multicast

ripRouting Information Protocol

ripngRouting Information Protocol next generation

Routes displayed are routes that the routing table has exported into the routing protocol
and that have been filtered by the associated protocol's export routing policy statements.
view

Example: Configuring the MED Attribute That Determines the Exit Point in an AS

show route advertising-protocol bgp (Layer 3 VPN) on page 526


show route advertising-protocol bgp detail on page 527
show route advertising-protocol bgp detail (Layer 2 VPN) on page 527
show route advertising-protocol bgp detail (Layer 3 VPN) on page 527
show route advertising-protocol bgp extensive all (Next Hop Self with RIB-out IP
Address) on page 527
Table 30 on page 525 lists the output fields for the show route advertising-protocol
command. Output fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 30: show route advertising-protocol Output Fields


Field Name

Field Description

Level of Output

routing-table-name

Name of the routing tablefor example, inet.0.

All levels

number
destinations

Number of destinations for which there are routes in the routing table.

All levels

number routes

Number of routes in the routing table and total number of routes in the following
states:

All levels

active (routes that are active)

holddown (routes that are in the pending state before being declared inactive)

hidden (routes that are not used because of a routing policy)

Prefix

Destination prefix.

brief none

destination-prefix
(entry , announced)

Destination prefix. The entry value is the number of routes for this destination,
and the announced value is the number of routes being announced for this
destination.

detail extensive

BGP group and type

BGP group name and type (Internal or External).

detail extensive

Route Distinguisher

Unique 64-bit prefix augmenting each IP subnet.

detail extensive

Advertised Label

Incoming label advertised by the LDP. When an IP packet enters a label-switched


path (LSP), the ingress router examines the packet and assigns it a label based
on its destination, placing the label in the packet's header. The label transforms
the packet from one that is forwarded based on its IP routing information to
one that is forwarded based on information associated with the label.

detail extensive

Label-Base, range

First label in a block of labels and label block size. A remote PE router uses this
first label when sending traffic toward the advertising PE router.

detail extensive

VPN Label

Virtual private network (VPN) label. Packets are sent between CE and PE routers
by advertising VPN labels. VPN labels transit over either an RSVP or an LDP
LSP tunnel.

detail extensive

Nexthop

Next hop to the destination. An angle bracket (>) indicates that the route is the
selected route.

All levels

If the next-hop advertisement to the peer is Self, and the RIB-out next hop is a
specific IP address, the RIB-out IP address is included in the extensive output.
See show route advertising-protocol bgp extensive all (Next Hop Self with RIB-out
IP Address) on page 527.
MED

Multiple exit discriminator value included in the route.

brief

Lclpref or Localpref

Local preference value included in the route.

All levels

Copyright 2015, Juniper Networks, Inc.

525

IS-IS Feature Guide for Routing Devices

Table 30: show route advertising-protocol Output Fields (continued)


Field Name

Field Description

Level of Output

AS path

AS path through which the route was learned. The letters at the end of the AS
path indicate the path origin, providing an indication of the state of the route at
the point at which the AS path originated:

All levels

IIGP.

EEGP.

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the local AS number associated with the AS path if

configured on the router, or if AS path prepending is configured.

{ }Braces enclose AS sets, which are groups of AS numbers in which the

order does not matter. A set commonly results from route aggregation. The
numbers in each AS set are displayed in ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an
unrecognized attribute and associated hexadecimal value if BGP receives
attribute 128 (attribute set) and you have not configured an independent domain
in any routing instance.
Communities

Community path attribute for the route. See the output field table for the show
route detail command for all possible values for this field.

detail extensive

AIGP

Accumulated interior gateway protocol (AIGP) BGP attribute.

detail extensive

Attrset AS

Number, local preference, and path of the autonomous system (AS) that
originated the route. These values are stored in the Attrset attribute at the
originating router.

detail extensive

Layer2-info: encaps

Layer 2 encapsulation (for example, VPLS).

detail extensive

control flags

Control flags: none or Site Down.

detail extensive

mtu

Maximum transmission unit (MTU) of the Layer 2 circuit.

detail extensive

Sample Output
show route advertising-protocol bgp (Layer 3 VPN)
user@host> show route advertising-protocol bgp 10.255.14.171
VPN-A.inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.14.172/32
Self
1
100 I
VPN-B.inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.14.181/32
Self
2
100 I

526

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route advertising-protocol bgp detail


user@host> show route advertising-protocol bgp 111.222.1.3 detail
bgp20.inet.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
111.222.1.11/32 (1 entry, 1 announced)
BGP group pe-pe type Internal
Route Distinguisher: 111.255.14.11:69
Advertised Label: 100000
next hop: Self
Localpref: 100
AS path: 2 I
Communities: target:69:20
AIGP 210
111.8.0.0/16 (1 entry, 1 announced)
BGP group pe-pe type Internal
Route Distinguisher: 111.255.14.11:69
Advertised Label: 100000
Next hop: Self
Localpref: 100
AS path: 2 I
Communities: target:69:20
AIGP 210

show route advertising-protocol bgp detail (Layer 2 VPN)


user@host> show route advertising-protocol bgp 192.168.24.1 detail
vpn-a.l2vpn.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
192.168.16.1:1:1:1/96 (1 entry, 1 announced)
BGP group int type Internal
Route Distinguisher: 192.168.16.1:1
Label-base : 32768, range : 3
Nexthop: Self
Localpref: 100
AS path: I
Communities: target:65412:100
AIGP 210
Layer2-info: encaps:VLAN, control flags:, mtu:

show route advertising-protocol bgp detail (Layer 3 VPN)


user@host> show route advertising-protocol bgp 10.255.14.176 detail
vpna.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
* 10.49.0.0/30 (1 entry, 1 announced)
BGP group ibgp type Internal
Route Distinguisher: 10.255.14.174:2
VPN Label: 101264
Nexthop: Self
Localpref: 100
AS path: I
Communities: target:200:100
AIGP 210
AttrSet AS: 100
Localpref: 100
AS path: I
...

show route advertising-protocol bgp extensive all (Next Hop Self with RIB-out IP Address)
user@host> show route advertising-protocol bgp 200.0.0.2 170.0.1.0/24 extensive all
inet.0: 13 destinations, 19 routes (13 active, 0 holddown, 6 hidden)
170.0.1.0/24 (2 entries, 1 announced)

Copyright 2015, Juniper Networks, Inc.

527

IS-IS Feature Guide for Routing Devices

BGP group eBGP-INTEROP type External


Nexthop: Self (rib-out 10.100.3.2)
AS path: [4713] 200 I
...

528

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route all


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description

Options

Syntax on page 529


Syntax (EX Series Switches) on page 529
show route all
<logical-system (all | logical-system-name)>
show route all

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display information about all routes in all routing tables, including private, or internal,
tables.
noneDisplay information about all routes in all routing tables, including private, or

internal, tables.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output


Output Fields

view

show route brief on page 534

show route detail on page 536

show route all on page 529


In Junos OS Release 9.5 and later, only the output fields for the show route all command
display all routing tables, including private, or hidden, routing tables. The output field
table of the show route command does not display entries for private, or hidden, routing
tables in Junos OS Release 9.5 and later.

Sample Output
show route all
The following example displays a snippet of output from the show route command and
then displays the same snippet of output from the show route all command:
user@host> show route
mpls.0: 7 destinations, 7 routes (5 active, 0 holddown, 2 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
0
*[MPLS/0] 2d 02:24:39, metric 1
Receive
1
*[MPLS/0] 2d 02:24:39, metric 1
Receive
2
*[MPLS/0] 2d 02:24:39, metric 1
Receive

Copyright 2015, Juniper Networks, Inc.

529

IS-IS Feature Guide for Routing Devices

800017
800018

*[VPLS/7] 1d 14:00:16
> via vt-3/2/0.32769, Pop
*[VPLS/7] 1d 14:00:26
> via vt-3/2/0.32772, Pop

user@host> show route all


mpls.0: 7 destinations, 7 routes (5 active, 0 holddown, 2 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
0
*[MPLS/0] 2d 02:19:12, metric 1
Receive
1
*[MPLS/0] 2d 02:19:12, metric 1
Receive
2
*[MPLS/0] 2d 02:19:12, metric 1
Receive
800017
*[VPLS/7] 1d 13:54:49
> via vt-3/2/0.32769, Pop
800018
*[VPLS/7] 1d 13:54:59
> via vt-3/2/0.32772, Pop
vt-3/2/0.32769
[VPLS/7] 1d 13:54:49
Unusable
vt-3/2/0.32772
[VPLS/7] 1d 13:54:59
Unusable

530

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route best


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description

Options

Syntax on page 531


Syntax (EX Series Switches) on page 531
show route best destination-prefix
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route best destination-prefix
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display the route in the routing table that is the best route to the specified address or
range of addresses. The best route is the longest matching route.
brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


destination-prefixAddress or range of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output

Output Fields

view

show route brief on page 534

show route detail on page 536

show route best on page 531


show route best detail on page 532
show route best extensive on page 533
show route best terse on page 533
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route best
user@host> show route best 10.255.70.103
inet.0: 24 destinations, 25 routes (23 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
10.255.70.103/32
*[OSPF/10] 1d 13:19:20, metric 2
> to 10.31.1.6 via ge-3/1/0.0
via so-0/3/0.0

Copyright 2015, Juniper Networks, Inc.

531

IS-IS Feature Guide for Routing Devices

inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


Restart Complete
+ = Active Route, - = Last Active, * = Both
10.255.70.103/32
*[RSVP/7] 1d 13:20:13, metric 2
> via so-0/3/0.0, label-switched-path green-r1-r3
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.0.0.0/8
*[Direct/0] 2d 01:43:34
> via fxp2.0
[Direct/0] 2d 01:43:34
> via fxp1.0

show route best detail


user@host> show route best 10.255.70.103 detail
inet.0: 24 destinations, 25 routes (23 active, 0 holddown, 1 hidden)
Restart Complete
10.255.70.103/32 (1 entry, 1 announced)
*OSPF
Preference: 10
Next-hop reference count: 9
Next hop: 10.31.1.6 via ge-3/1/0.0, selected
Next hop: via so-0/3/0.0
State: <Active Int>
Local AS:
69
Age: 1d 13:20:06
Metric: 2
Area: 0.0.0.0
Task: OSPF
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
10.255.70.103/32 (1 entry, 1 announced)
State: <FlashAll>
*RSVP
Preference: 7
Next-hop reference count: 5
Next hop: via so-0/3/0.0 weight 0x1, selected
Label-switched-path green-r1-r3
Label operation: Push 100016
State: <Active Int>
Local AS:
69
Age: 1d 13:20:59
Metric: 2
Task: RSVP
Announcement bits (1): 1-Resolve tree 2
AS path: I
private1__inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
10.0.0.0/8 (2 entries, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via fxp2.0, selected
State: <Active Int>
Age: 2d 1:44:20
Task: IF
AS path: I
Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1

532

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Next hop: via fxp1.0, selected


State: <NotBest Int>
Inactive reason: No difference
Age: 2d 1:44:20
Task: IF
AS path: I

show route best extensive


The output for the show route best extensive command is identical to that for the show
route best detail command. For sample output, see show route best detail on page 532.
show route best terse
user@host> show route best 10.255.70.103 terse
inet.0: 24 destinations, 25 routes (23 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
* 10.255.70.103/32

P Prf
O 10

Metric 1
2

Metric 2

Next hop
>10.31.1.6
so-0/3/0.0

AS path

inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
* 10.255.70.103/32

P Prf
R
7

Metric 1
2

Metric 2

Next hop
>so-0/3/0.0

AS path

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
A Destination
* 10.0.0.0/8

Copyright 2015, Juniper Networks, Inc.

P Prf
D
0
D
0

Metric 1

Metric 2

Next hop
>fxp2.0
>fxp1.0

AS path

533

IS-IS Feature Guide for Routing Devices

show route brief


List of Syntax

Syntax

Syntax (EX Series


Switches)

Syntax on page 534


Syntax (EX Series Switches) on page 534
show route brief
<destination-prefix>
<logical-system (all | logical-system-name)>
show route brief
<destination-prefix>

Release Information

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.

Description

Display brief information about the active entries in the routing tables.

Options

noneDisplay all active entries in the routing table.


destination-prefix(Optional) Display active entries for the specified address or range

of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation

List of Sample Output


Output Fields

view

show route all on page 529

show route best on page 531

show route brief on page 534


For information about output fields, see the Output Field table of the show route
command.

Sample Output
show route brief
user@host> show route brief
inet.0: 10 destinations, 10 routes (9 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0
10.255.245.51/32
172.16.0.0/12
192.168.0.0/18
192.168.40.0/22

534

*[Static/5] 1w5d 20:30:29


Discard
*[Direct/0] 2w4d 13:11:14
> via lo0.0
*[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
*[Static/5] 1w5d 20:30:29
> to 192.168.167.254 via fxp0.0
*[Static/5] 2w4d 13:11:14

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

> to 192.168.167.254 via fxp0.0


*[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
192.168.164.0/22
*[Direct/0] 2w4d 13:11:14
> via fxp0.0
192.168.164.51/32 *[Local/0] 2w4d 13:11:14
Local via fxp0.0
207.17.136.192/32 *[Static/5] 2w4d 13:11:14
> to 192.168.167.254 via fxp0.0
green.inet.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
100.101.0.0/16
*[Direct/0] 1w5d 20:30:28
> via fe-0/0/3.0
100.101.2.3/32
*[Local/0] 1w5d 20:30:28
Local via fe-0/0/3.0
224.0.0.5/32
*[OSPF/10] 1w5d 20:30:29, metric 1
MultiRecv
192.168.64.0/18

Copyright 2015, Juniper Networks, Inc.

535

IS-IS Feature Guide for Routing Devices

show route detail


List of Syntax

Syntax on page 536


Syntax (EX Series Switches) on page 536

Syntax

show route detail


<destination-prefix>
<logical-system (all | logical-system-name)>

Syntax (EX Series


Switches)

show route detail


<destination-prefix>

Release Information

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.

Description

Display detailed information about the active entries in the routing tables.

Options

noneDisplay all active entries in the routing table on all systems.


destination-prefix(Optional) Display active entries for the specified address or range

of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level

view

List of Sample Output

show route detail on page 545


show route detail (with BGP Multipath) on page 551
show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint
LSPs) on page 552
show route label detail (Multipoint LDP with Multicast-Only Fast Reroute) on page 552

Output Fields

Table 31 on page 536 describes the output fields for the show route detail command.
Output fields are listed in the approximate order in which they appear.

Table 31: show route detail Output Fields


Field Name

Field Description

routing-table-name

Name of the routing table (for example, inet.0).

number destinations

Number of destinations for which there are routes in the routing table.

number routes

Number of routes in the routing table and total number of routes in the following states:

536

active (routes that are active)

holddown (routes that are in the pending state before being declared inactive)

hidden (routes that are not used because of a routing policy)

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 31: show route detail Output Fields (continued)


Field Name

Field Description

route-destination
(entry, announced)

Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:

MPLS-label (for example, 80001).

interface-name (for example, ge-1/0/2).

neighbor-address:control-word-status:encapsulation type:vc-id:source (Layer 2 circuit only; for example,

10.1.1.195:NoCtrlWord:1:1:Local/96).

neighbor-addressAddress of the neighbor.

control-word-statusWhether the use of the control word has been negotiated for this virtual
circuit: NoCtrlWord or CtrlWord.

encapsulation typeType of encapsulation, represented by a number: (1) Frame Relay DLCI, (2)

ATM AAL5 VCC transport, (3) ATM transparent cell transport, (4) Ethernet, (5) VLAN Ethernet,
(6) HDLC, (7) PPP, (8) ATM VCC cell transport, (10) ATM VPC cell transport.

label stacking

vc-idVirtual circuit identifier.

sourceSource of the advertisement: Local or Remote.

(Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the

label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.

S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing

device with one fewer label (the label-popping operation is performed).

[protocol, preference]

If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).

Protocol from which the route was learned and the preference value for the route.

+A plus sign indicates the active route, which is the route installed from the routing table into the

forwarding table.

- A hyphen indicates the last active route.

*An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.

In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
Level

(IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.

Route Distinguisher

IP subnet augmented with a 64-bit prefix.

PMSI

Provider multicast service interface (MVPN routing table).

Next-hop type

Type of next hop. For a description of possible values for this field, see Table 32 on page 541.

Copyright 2015, Juniper Networks, Inc.

537

IS-IS Feature Guide for Routing Devices

Table 31: show route detail Output Fields (continued)


Field Name

Field Description

Next-hop reference
count

Number of references made to the next hop.

Flood nexthop branches


exceed maximum

Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
only a subset of the flood next-hop branches were installed in the kernel.

message
Source

IP address of the route source.

Next hop

Network layer address of the directly reachable neighboring system.

via

Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:

WeightValue used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.

BalanceBalance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.

Label-switched-path
lsp-path-name

Name of the LSP used to reach the next hop.

Label operation

MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).

Interface

(Local only) Local interface name.

Protocol next hop

Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.

Indirect next hop

Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.

State

State of the route (a route can be in more than one state). See Table 33 on page 543.

Local AS

AS number of the local routing device.

Age

How long the route has been known.

AIGP

Accumulated interior gateway protocol (AIGP) BGP attribute.

Metricn

Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.

538

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 31: show route detail Output Fields (continued)


Field Name

Field Description

MED-plus-IGP

Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.

TTL-Action

For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
For sample output, see show route table.

Task

Name of the protocol that has added the route.

Announcement bits

The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the KRT for
installing the route into the Packet Forwarding Engine, to a resolve tree, a L2 VC, or even a VPN. For
example, n-Resolve inet indicates that the specified route is used for route resolution for next hops
found in the routing table.

AS path

nAn index used by Juniper Networks customer support only.

AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:

IIGP.

EEGP.

RecordedThe AS path is recorded by the sample process (sampled).

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the number that precedes the AS path. This number represents the number

of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.

[ ]If more than one AS number is configured on the routing device, or if AS path prepending is

configured, brackets enclose the local AS number associated with the AS path.

{ }Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.

A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
validation-state

(BGP-learned routes) Validation status of the route:

InvalidIndicates that the prefix is found, but either the corresponding AS received from the EBGP

peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.

UnknownIndicates that the prefix is not among the prefixes or prefix ranges in the database.

UnverifiedIndicates that the origin of the prefix is not verified against the database. This is because

the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.

ValidIndicates that the prefix and autonomous system pair are found in the database.

Copyright 2015, Juniper Networks, Inc.

539

IS-IS Feature Guide for Routing Devices

Table 31: show route detail Output Fields (continued)


Field Name

Field Description

FECs bound to route

Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.

Primary Upstream

When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.

RPF Nexthops

When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.

Label

Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.

weight

Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.

VC Label

MPLS label assigned to the Layer 2 circuit virtual connection.

MTU

Maximum transmission unit (MTU) of the Layer 2 circuit.

VLAN ID

VLAN identifier of the Layer 2 circuit.

Prefixes bound to route

Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.

Communities

Community path attribute for the route. See Table 34 on page 545 for all possible values for this field.

Layer2-info: encaps

Layer 2 encapsulation (for example, VPLS).

control flags

Control flags: none or Site Down.

mtu

Maximum transmission unit (MTU) information.

Label-Base, range

First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.

status vector

Layer 2 VPN and VPLS network layer reachability information (NLRI).

Accepted Multipath

Current active path when BGP multipath is configured.

Accepted
LongLivedStale

The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag may be displayed
for a route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.

540

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 31: show route detail Output Fields (continued)


Field Name

Field Description

Accepted
LongLivedStaleImport

The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy. Either this flag or the LongLivedStale flag may be displayed for a
route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table

ImportAccepted
LongLivedStaleImport

Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.

Accepted
MultipathContrib

Path currently contributing to BGP multipath.

Localpref

Local preference value included in the route.

Router ID

BGP router ID as advertised by the neighbor in the open message.

Primary Routing Table

In a routing table group, the name of the primary routing table in which the route resides.

Secondary Tables

In a routing table group, the name of one or more secondary tables in which the route resides.

Table 32 on page 541 describes all possible values for the Next-hop Types output field.

Table 32: Next-hop Types Output Field Values


Next-Hop Type

Description

Broadcast (bcast)

Broadcast next hop.

Deny

Deny next hop.

Discard

Discard next hop.

Flood

Flood next hop. Consists of components called branches,


up to a maximum of 32 branches. Each flood next-hop
branch sends a copy of the traffic to the forwarding
interface. Used by point-to-multipoint RSVP,
point-to-multipoint LDP, point-to-multipoint CCC, and
multicast.

Hold

Next hop is waiting to be resolved into a unicast or


multicast type.

Indexed (idxd)

Indexed next hop.

Copyright 2015, Juniper Networks, Inc.

541

IS-IS Feature Guide for Routing Devices

Table 32: Next-hop Types Output Field Values (continued)


Next-Hop Type

Description

Indirect (indr)

Used with applications that have a protocol next hop


address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.

Interface

Used for a network address assigned to an interface. Unlike


the router next hop, the interface next hop does not
reference any specific node on the network.

Local (locl)

Local address on an interface. This next-hop type causes


packets with this destination address to be received locally.

Multicast (mcst)

Wire multicast next hop (limited to the LAN).

Multicast discard (mdsc)

Multicast discard.

Multicast group (mgrp)

Multicast group member.

Receive (recv)

Receive.

Reject (rjct)

Discard. An ICMP unreachable message was sent.

Resolve (rslv)

Resolving next hop.

Routed multicast (mcrt)

Regular multicast next hop.

Router

A specific node or set of nodes to which the routing device


forwards packets that match the route prefix.
To qualify as next-hop type router, the route must meet
the following criteria:

Must not be a direct or local subnet for the routing


device.

Must have a next hop that is directly connected to the


routing device.

Table

Routing table next hop.

Unicast (ucst)

Unicast.

Unilist (ulst)

List of unicast next hops. A packet sent to this next hop


goes to any next hop in the list.

Table 33 on page 543 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).

542

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 33: State Output Field Values


Value

Description

Accounting

Route needs accounting.

Active

Route is active.

Always Compare MED

Path with a lower multiple exit discriminator (MED) is


available.

AS path

Shorter AS path is available.

Cisco Non-deterministic MED


selection

Cisco nondeterministic MED is enabled, and a path with a


lower MED is available.

Clone

Route is a clone.

Cluster list length

Length of cluster list sent by the route reflector.

Delete

Route has been deleted.

Ex

Exterior route.

Ext

BGP route received from an external BGP neighbor.

FlashAll

Forces all protocols to be notified of a change to any route,


active or inactive, for a prefix. When not set, protocols are
informed of a prefix only when the active route changes.

Hidden

Route not used because of routing policy.

IfCheck

Route needs forwarding RPF check.

IGP metric

Path through next hop with lower IGP metric is available.

Inactive reason

Flags for this route, which was not selected as best for a
particular destination.

Initial

Route being added.

Int

Interior route.

Int Ext

BGP route received from an internal BGP peer or a BGP


confederation peer.

Interior > Exterior > Exterior via


Interior

Direct, static, IGP, or EBGP path is available.

Local Preference

Path with a higher local preference value is available.

Martian

Route is a martian (ignored because it is obviously invalid).

Copyright 2015, Juniper Networks, Inc.

543

IS-IS Feature Guide for Routing Devices

Table 33: State Output Field Values (continued)


Value

Description

MartianOK

Route exempt from martian filtering.

Next hop address

Path with lower metric next hop is available.

No difference

Path from neighbor with lower IP address is available.

NoReadvrt

Route not to be advertised.

NotBest

Route not chosen because it does not have the lowest MED.

Not Best in its group

Incoming BGP AS is not the best of a group (only one AS can


be the best).

NotInstall

Route not to be installed in the forwarding table.

Number of gateways

Path with a greater number of next hops is available.

Origin

Path with a lower origin code is available.

Pending

Route pending because of a hold-down configured on another


route.

Release

Route scheduled for release.

RIB preference

Route from a higher-numbered routing table is available.

Route Distinguisher

64-bit prefix added to IP subnets to make them unique.

Route Metric or MED comparison

Route with a lower metric or MED is available.

Route Preference

Route with lower preference value is available

Router ID

Path through a neighbor with lower ID is available.

Secondary

Route not a primary route.

Unusable path

Path is not usable because of one of the following conditions:

Update source

The route is damped.

The route is rejected by an import policy.

The route is unresolved.

Last tiebreaker is the lowest IP address value.

Table 34 on page 545 describes the possible values for the Communities output field.

544

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 34: Communities Output Field Values


Value

Description

area-number

4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.

bandwidth: local AS
number:link-bandwidth-number

Link-bandwidth community value used for unequal-cost load balancing. When BGP has
several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.

domain-id

Unique configurable number that identifies the OSPF domain.

domain-id-vendor

Unique configurable number that further identifies the OSPF domain.

link-bandwidth-number

Link-bandwidth number: from 0 through 4,294,967,295 (bytes per second).

local AS number

Local AS number: from 1 through 65,535.

options

1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.

origin

(Used with VPNs) Identifies where the route came from.

ospf-route-type

1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.

route-type-vendor

Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.

rte-type

Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.

target

Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.

unknown IANA

Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.

unknown OSPF vendor


community

Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
attribute is accepted, but it is not recognized.

Sample Output
show route detail
user@host> show route detail
inet.0: 22 destinations, 23 routes (21 active, 0 holddown, 1 hidden)

Copyright 2015, Juniper Networks, Inc.

545

IS-IS Feature Guide for Routing Devices

10.10.0.0/16 (1 entry, 1 announced)


*Static Preference: 5
Next-hop reference count: 29
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 1:31:43
Task: RT
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
10.31.1.0/30 (2 entries, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 2
Next hop: via so-0/3/0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:30:17
Task: IF
Announcement bits (1): 3-Resolve tree 2
AS path: I
OSPF
Preference: 10
Next-hop reference count: 1
Next hop: via so-0/3/0.0, selected
State: <Int>
Inactive reason: Route Preference
Local AS:
69
Age: 1:30:17
Metric: 1
Area: 0.0.0.0
Task: OSPF
AS path: I
10.31.1.1/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local
Next-hop reference count: 7
Interface: so-0/3/0.0
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:30:20
Task: IF
Announcement bits (1): 3-Resolve tree 2
AS path: I
...
10.31.2.0/30 (1 entry, 1 announced)
*OSPF
Preference: 10
Next-hop reference count: 9
Next hop: via so-0/3/0.0
Next hop: 10.31.1.6 via ge-3/1/0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:29:56
Metric: 2
Area: 0.0.0.0
Task: OSPF
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
...

546

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

224.0.0.2/32 (1 entry, 1 announced)


*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:45
Task: PIM Recv
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
...
224.0.0.22/32 (1 entry, 1 announced)
*IGMP
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:43
Task: IGMP
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
10.255.70.103/32 (1 entry, 1 announced)
State: <FlashAll>
*RSVP
Preference: 7
Next-hop reference count: 6
Next hop: 10.31.1.6 via ge-3/1/0.0 weight 0x1, selected
Label-switched-path green-r1-r3
Label operation: Push 100096
State: <Active Int>
Local AS:
69
Age: 1:25:49
Metric: 2
Task: RSVP
Announcement bits (2): 1-Resolve tree 1 2-Resolve tree 2
AS path: I
10.255.71.238/32 (1 entry, 1 announced)
State: <FlashAll>
*RSVP
Preference: 7
Next-hop reference count: 6
Next hop: via so-0/3/0.0 weight 0x1, selected
Label-switched-path green-r1-r2
State: <Active Int>
Local AS:
69
Age: 1:25:49
Metric: 1
Task: RSVP
Announcement bits (2): 1-Resolve tree 1 2-Resolve tree 2
AS path: I
private__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
47.0005.80ff.f800.0000.0108.0001.0102.5507.1052/152 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected

Copyright 2015, Juniper Networks, Inc.

547

IS-IS Feature Guide for Routing Devices

State: <Active Int>


Local AS:
69
Age: 1:31:44
Task: IF
AS path: I
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
0
(1 entry, 1 announced)
*MPLS
Preference: 0
Next hop type: Receive
Next-hop reference count: 6
State: <Active Int>
Local AS:
69
Age: 1:31:45
Metric: 1
Task: MPLS
Announcement bits (1): 0-KRT
AS path: I
...
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
299840 (1 entry, 1 announced)
TSI:
KRT in-kernel 299840 /52 -> {indirect(1048575)}
*RSVP
Preference: 7/2
Next hop type: Flood
Address: 0x9174a30
Next-hop reference count: 4
Next hop type: Router, Next hop index: 798
Address: 0x9174c28
Next-hop reference count: 2
Next hop: 8.0.0.2 via lt-1/2/0.9 weight 0x1
Label-switched-path R2-to-R4-2p2mp
Label operation: Pop
Next hop type: Router, Next hop index: 1048574
Address: 0x92544f0
Next-hop reference count: 2
Next hop: 7.0.0.2 via lt-1/2/0.7 weight 0x1
Label-switched-path R2-to-R200-p2mp
Label operation: Pop
Next hop: 6.0.0.2 via lt-1/2/0.5 weight 0x8001
Label operation: Pop
State: <Active Int>
Age: 1:29
Metric: 1
Task: RSVP
Announcement bits (1): 0-KRT
AS path: I...
800010 (1 entry, 1 announced)
*VPLS
Preference: 7
Next-hop reference count: 2
Next hop: via vt-3/2/0.32769, selected
Label operation: Pop
State: <Active Int>
Age: 1:29:30
Task: Common L2 VC
Announcement bits (1): 0-KRT
AS path: I
vt-3/2/0.32769 (1 entry, 1 announced)

548

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

*VPLS

Preference: 7
Next-hop reference count: 2
Next hop: 10.31.1.6 via ge-3/1/0.0 weight 0x1, selected
Label-switched-path green-r1-r3
Label operation: Push 800012, Push 100096(top)
Protocol next hop: 10.255.70.103
Push 800012
Indirect next hop: 87272e4 1048574
State: <Active Int>
Age: 1:29:30
Metric2: 2
Task: Common L2 VC
Announcement bits (2): 0-KRT 1-Common L2 VC
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0

inet6.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)


abcd::10:255:71:52/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:31:44
Task: IF
AS path: I
fe80::280:42ff:fe10:f179/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:44
Task: IF
AS path: I
ff02::2/128 (1 entry, 1 announced)
*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:45
Task: PIM Recv6
Announcement bits (1): 0-KRT
AS path: I
ff02::d/128 (1 entry, 1 announced)
*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:45
Task: PIM Recv6
Announcement bits (1): 0-KRT
AS path: I
ff02::16/128 (1 entry, 1 announced)

Copyright 2015, Juniper Networks, Inc.

549

IS-IS Feature Guide for Routing Devices

*MLD

Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:31:43
Task: MLD
Announcement bits (1): 0-KRT
AS path: I

private.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


fe80::280:42ff:fe10:f179/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.16385, selected
State: <Active NoReadvrt Int>
Age: 1:31:44
Task: IF
AS path: I
green.l2vpn.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
10.255.70.103:1:3:1/96 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.70.103:1
Next-hop reference count: 7
Source: 10.255.70.103
Protocol next hop: 10.255.70.103
Indirect next hop: 2 no-forward
State: <Secondary Active Int Ext>
Local AS:
69 Peer AS:
69
Age: 1:25:49
Metric2: 1
AIGP 210
Task: BGP_69.10.255.70.103+179
Announcement bits (1): 0-green-l2vpn
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Label-base: 800008, range: 8
Localpref: 100
Router ID: 10.255.70.103
Primary Routing Table bgp.l2vpn.0
10.255.71.52:1:1:1/96 (1 entry, 1 announced)
*L2VPN Preference: 170/-1
Next-hop reference count: 5
Protocol next hop: 10.255.71.52
Indirect next hop: 0 State: <Active Int Ext>
Age: 1:31:40
Metric2: 1
Task: green-l2vpn
Announcement bits (1): 1-BGP.0.0.0.0+179
AS path: I
Communities: Layer2-info: encaps:VPLS, control flags:Site-Down,
mtu: 0
Label-base: 800016, range: 8, status-vector: 0x9F
10.255.71.52:1:5:1/96 (1 entry, 1 announced)
*L2VPN Preference: 170/-101
Next-hop reference count: 5

550

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Protocol next hop: 10.255.71.52


Indirect next hop: 0 State: <Active Int Ext>
Age: 1:31:40
Metric2: 1
Task: green-l2vpn
Announcement bits (1): 1-BGP.0.0.0.0+179
AS path: I
Communities: Layer2-info: encaps:VPLS, control flags:, mtu: 0
Label-base: 800008, range: 8, status-vector: 0x9F
...
l2circuit.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
10.245.255.63:CtrlWord:4:3:Local/96 (1 entry, 1 announced)
*L2CKT Preference: 7
Next hop: via so-1/1/2.0 weight 1, selected
Label-switched-path my-lsp
Label operation: Push 100000[0]
Protocol next hop: 10.245.255.63 Indirect next hop: 86af000 296
State: <Active Int>
Local AS:
99
Age: 10:21
Task: l2 circuit
Announcement bits (1): 0-LDP
AS path: I
VC Label 100000, MTU 1500, VLAN ID 512

show route detail (with BGP Multipath)


user@host> show route detail
10.1.1.8/30 (2 entries, 1 announced)
*BGP
Preference: 170/-101
Next hop type: Router, Next hop index: 262142
Address: 0x901a010
Next-hop reference count: 2
Source: 10.1.1.2
Next hop: 10.1.1.2 via ge-0/3/0.1, selected
Next hop: 10.1.1.6 via ge-0/3/0.5
State: <Active Ext>
Local AS:
1 Peer AS:
2
Age: 5:04:43
Validation State: unverified
Task: BGP_2.10.1.1.2+59955
Announcement bits (1): 0-KRT
AS path: 2 I
Accepted Multipath
Localpref: 100
Router ID: 1.1.1.2
BGP
Preference: 170/-101
Next hop type: Router, Next hop index: 678
Address: 0x8f97520
Next-hop reference count: 9
Source: 10.1.1.6
Next hop: 10.1.1.6 via ge-0/3/0.5, selected
State: <NotBest Ext>
Inactive reason: Not Best in its group - Active preferred
Local AS:
1 Peer AS:
2
Age: 5:04:43
Validation State: unverified
Task: BGP_2.10.1.1.6+58198

Copyright 2015, Juniper Networks, Inc.

551

IS-IS Feature Guide for Routing Devices

AS path: 2 I
Accepted MultipathContrib
Localpref: 100
Router ID: 1.1.1.3

show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint LSPs)
user@host> show route label 299872 detail
mpls.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)
299872 (1 entry, 1 announced)
*LDP
Preference: 9
Next hop type: Flood
Next-hop reference count: 3
Address: 0x9097d90
Next hop: via vt-0/1/0.1
Next-hop index: 661
Label operation: Pop
Address: 0x9172130
Next hop: via so-0/0/3.0
Next-hop index: 654
Label operation: Swap 299872
State: **Active Int>
Local AS: 1001
Age: 8:20
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
FECs bound to route: P2MP root-addr 10.255.72.166, grp 232.1.1.1,
src 192.168.142.2

show route label detail (Multipoint LDP with Multicast-Only Fast Reroute)
user@host> show route label 301568 detail
mpls.0: 18 destinations, 18 routes (18 active, 0 holddown, 0 hidden)
301568 (1 entry, 1 announced)
*LDP
Preference: 9
Next hop type: Flood
Address: 0x2735208
Next-hop reference count: 3
Next hop type: Router, Next hop index: 1397
Address: 0x2735d2c
Next-hop reference count: 3
Next hop: 1.3.8.2 via ge-1/2/22.0
Label operation: Pop
Load balance label: None;
Next hop type: Router, Next hop index: 1395
Address: 0x2736290
Next-hop reference count: 3
Next hop: 1.3.4.2 via ge-1/2/18.0
Label operation: Pop
Load balance label: None;
State: <Active Int AckRequest MulticastRPF>
Local AS:
10
Age: 54:05
Metric: 1
Validation State: unverified
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
FECs bound to route: P2MP root-addr 1.1.1.1, grp: 232.1.1.1, src:
192.168.219.11

552

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Primary Upstream : 1.1.1.3:0--1.1.1.2:0


RPF Nexthops :
ge-1/2/15.0, 1.2.94.1, Label: 301568, weight: 0x1
ge-1/2/14.0, 1.2.3.1, Label: 301568, weight: 0x1
Backup Upstream : 1.1.1.3:0--1.1.1.6:0
RPF Nexthops :
ge-1/2/20.0, 1.2.96.1, Label: 301584, weight: 0xfffe
ge-1/2/19.0, 1.3.6.1, Label: 301584, weight: 0xfffe

Copyright 2015, Juniper Networks, Inc.

553

IS-IS Feature Guide for Routing Devices

show route exact


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description
Options

Syntax on page 554


Syntax (EX Series Switches) on page 554
show route exact destination-prefix
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route exact destination-prefix
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display only the routes that exactly match the specified address or range of addresses.
brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


destination-prefixAddress or range of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output

Output Fields

view

show route exact on page 554


show route exact detail on page 554
show route exact extensive on page 555
show route exact terse on page 555
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route exact
user@host> show route exact 207.17.136.0/24
inet.0: 24 destinations, 25 routes (23 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
207.17.136.0/24
*[Static/5] 2d 03:30:22
> to 192.168.71.254 via fxp0.0

show route exact detail


user@host> show route exact 207.17.136.0/24 detail
inet.0: 24 destinations, 25 routes (23 active, 0 holddown, 1 hidden)

554

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Restart Complete
207.17.136.0/24 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 29
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2d 3:30:26
Task: RT
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I

show route exact extensive


user@host> show route exact 207.17.136.0/24 extensive
inet.0: 22 destinations, 23 routes (21 active, 0 holddown, 1 hidden)
207.17.136.0/24 (1 entry, 1 announced)
TSI:
KRT in-kernel 207.17.136.0/24 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 29
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 1:25:18
Task: RT
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I

show route exact terse


user@host> show route exact 207.17.136.0/24 terse
inet.0: 22 destinations, 23 routes (21 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
A Destination
P Prf
Metric 1
Metric 2 Next hop
AS path
* 207.17.136.0/24
S
5
>192.168.71.254

Copyright 2015, Juniper Networks, Inc.

555

IS-IS Feature Guide for Routing Devices

show route export


List of Syntax

Syntax on page 556


Syntax (EX Series Switches) on page 556

Syntax

show route export


<brief | detail>
<instance <instance-name> | routing-table-name>
<logical-system (all | logical-system-name)>

Syntax (EX Series


Switches)

show route export


<brief | detail>
<instance <instance-name> | routing-table-name>

Release Information

Description

Options

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display policy-based route export information. Policy-based export simplifies the process
of exchanging route information between routing instances.
none(Same as brief.) Display standard information about policy-based export for all

instances and routing tables on all systems.


brief | detail(Optional) Display the specified level of output.
instance <instance-name>(Optional) Display a particular routing instance for which

policy-based export is currently enabled.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


routing-table-name(Optional) Display information about policy-based export for all

routing tables whose name begins with this string (for example, inet.0 and inet6.0
are both displayed when you run the show route export inet command).
Required Privilege
Level
List of Sample Output

Output Fields

view

show route export on page 557


show route export detail on page 557
show route export instance detail on page 557
Table 35 on page 556 lists the output fields for the show route export command. Output
fields are listed in the approximate order in which they appear.

Table 35: show route export Output Fields


Field Name

Field Description

Level of Output

Table or table-name

Name of the routing tables that either import or export routes.

All levels

Routes

Number of routes exported from this table into other tables. If a particular route
is exported to different tables, the counter will only increment by one.

brief none

556

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 35: show route export Output Fields (continued)


Field Name

Field Description

Level of Output

Export

Whether the table is currently exporting routes to other tables: Y or N (Yes or No).

brief none

Import

Tables currently importing routes from the originator table. (Not displayed for
tables that are not exporting any routes.)

detail

Flags

(instance keyword only) Flags for this feature on this instance:

detail

config auto-policyThe policy was deduced from the configured IGP export

policies.

Options

cleanupConfiguration information for this instance is no longer valid.

configThe instance was explicitly configured.

(instance keyword only) Configured option displays the type of routing tables the
feature handles:

unicastIndicates instance.inet.0.

multicastIndicates instance.inet.2.

unicast multicastIndicates instance.inet.0 and instance.inet.2.

detail

Import policy

(instance keyword only) Policy that route export uses to construct the import-export
matrix. Not displayed if the instance type is vrf.

detail

Instance

(instance keyword only) Name of the routing instance.

detail

Type

(instance keyword only) Type of routing instance: forwarding, non-forwarding, or


vrf.

detail

Sample Output
show route export
user@host> show route export
Table
inet.0
black.inet.0
red.inet.0

Export
N
Y
Y

Routes
0
3
4

show route export detail


user@host> show route export detail
inet.0
black.inet.0
Import: [ inet.0 ]
red.inet.0
Import: [ inet.0 ]

Routes:
Routes:

0
3

Routes:

show route export instance detail


user@host> show route export instance detail
Instance: master
Type: forwarding
Flags: <config auto-policy> Options: <unicast multicast>
Import policy: [ (ospf-master-from-red || isis-master-from-black) ]

Copyright 2015, Juniper Networks, Inc.

557

IS-IS Feature Guide for Routing Devices

Instance: black
Instance: red

558

Type: non-forwarding
Type: non-forwarding

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route extensive


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description
Options

Syntax on page 559


Syntax (EX Series Switches) on page 559
show route extensive
<destination-prefix>
<logical-system (all | logical-system-name)>
show route extensive
<destination-prefix>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display extensive information about the active entries in the routing tables.
noneDisplay all active entries in the routing table.
destination-prefix(Optional) Display active entries for the specified address or range

of addresses.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level

view

List of Sample Output

show route extensive on page 566


show route extensive (Access Route) on page 573
show route extensive (BGP PIC Edge) on page 573
show route extensive (FRR and LFA) on page 573
show route extensive (Route Reflector) on page 574
show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint
LSPs) on page 575
show route label detail (Multipoint LDP with Multicast-Only Fast Reroute) on page 575

Output Fields

Table 36 on page 559 describes the output fields for the show route extensive command.
Output fields are listed in the approximate order in which they appear.

Table 36: show route extensive Output Fields


Field Name

Field Description

routing-table-name

Name of the routing table (for example, inet.0).

number destinations

Number of destinations for which there are routes in the routing table.

Copyright 2015, Juniper Networks, Inc.

559

IS-IS Feature Guide for Routing Devices

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

number routes

Number of routes in the routing table and total number of routes in the following states:

route-destination
(entry, announced)

active (routes that are active).

holddown (routes that are in the pending state before being declared inactive).

hidden (routes that are not used because of a routing policy).

Route destination (for example: 10.0.0.1/24). The entry value is the number of route for this destination,
and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:

MPLS-label (for example, 80001 ).

interface-name (for example, ge-1/0/2).

neighbor-address:control-word-status:encapsulation type:vc-id:source (Layer 2 circuit only; for example,

10.1.1.195:NoCtrlWord:1:1:Local/96).

neighbor-addressAddress of the neighbor.

control-word-statusWhether the use of the control word has been negotiated for this virtual
circuit: NoCtrlWord or CtrlWord.

encapsulation typeType of encapsulation, represented by a number: (1) Frame Relay DLCI, (2)

ATM AAL5 VCC transport, (3) ATM transparent cell transport, (4) Ethernet, (5) VLAN Ethernet,
(6) HDLC, (7) PPP, (8) ATM VCC cell transport, (10) ATM VPC cell transport.

vc-idVirtual circuit identifier.

sourceSource of the advertisement: Local or Remote.

TSI

Protocol header information.

label stacking

(Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the
label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.

S=0 route indicates that a packet with an incoming label stack depth of two or more exits this router

with one fewer label (the label-popping operation is performed).

[protocol, preference]

If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).

Protocol from which the route was learned and the preference value for the route.

+A plus sign indicates the active route, which is the route installed from the routing table into the

forwarding table.

- A hyphen indicates the last active route.

*An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.

In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.

560

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

Level

(IS-IS only). In IS-IS, a single autonomous system (AS) can be divided into smaller groups called
areas. Routing between areas is organized hierarchically, allowing a domain to be administratively
divided into smaller areas. This organization is accomplished by configuring Level 1 and Level 2
intermediate systems. Level 1 systems route within an area. When the destination is outside an area,
they route toward a Level 2 system. Level 2 intermediate systems route between areas and toward
other ASs.

Route Distinguisher

IP subnet augmented with a 64-bit prefix.

PMSI

Provider multicast service interface (MVPN routing table).

Next-hop type

Type of next hop. For a description of possible values for this field, see the Output Field table in the
show route detail command.

Next-hop reference
count

Number of references made to the next hop.

Flood nexthop branches


exceed maximum

Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
only a subset of the flood next-hop branches were installed in the kernel.

message
Source

IP address of the route source.

Next hop

Network layer address of the directly reachable neighboring system.

via

Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:

WeightValue used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.

BalanceBalance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.

Label-switched-path
lsp-path-name

Name of the LSP used to reach the next hop.

Label operation

MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).

Offset

Whether the metric has been increased or decreased by an offset value.

Interface

(Local only) Local interface name.

Protocol next hop

Network layer address of the remote routing device that advertised the prefix. This address is used
to recursively derive a forwarding next hop.

Copyright 2015, Juniper Networks, Inc.

561

IS-IS Feature Guide for Routing Devices

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

label-operation

MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).

Indirect next hops

When present, a list of nodes that are used to resolve the path to the next-hop destination, in the
order that they are resolved.
When BGP PIC Edge is enabled, the output lines that contain Indirect next hop: weight follow next
hops that the software can use to repair paths where a link failure occurs. The next-hop weight has
one of the following values:

0x1 indicates active next hops.

0x4000 indicates passive next hops.

State

State of the route (a route can be in more than one state). See the Output Field table in the show
route detail command.

Session ID

The BFD session ID number that represents the protection using MPLS fast reroute (FRR) and loop-free
alternate (LFA).

Weight

Weight for the backup path. If the weight of an indirect next hop is larger than zero, the weight value
is shown.
For sample output, see show route table.

562

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

Inactive reason

If the route is inactive, the reason for its current state is indicated. Typical reasons include:

Active preferredCurrently active route was selected over this route.

Always compare MEDPath with a lower multiple exit discriminator (MED) is available.

AS pathShorter AS path is available.

Cisco Non-deterministic MED selectionCisco nondeterministic MED is enabled and a path with a

lower MED is available.

Cluster list lengthPath with a shorter cluster list length is available.

Forwarding use onlyPath is only available for forwarding purposes.

IGP metricPath through the next hop with a lower IGP metric is available.

IGP metric typePath with a lower OSPF link-state advertisement type is available.

Interior > Exterior > Exterior via InteriorDirect, static, IGP, or EBGP path is available.

Local preferencePath with a higher local preference value is available.

Next hop addressPath with a lower metric next hop is available.

No differencePath from a neighbor with a lower IP address is available.

Not Best in its groupOccurs when multiple peers of the same external AS advertise the same

prefix and are grouped together in the selection process. When this reason is displayed, an additional
reason is provided (typically one of the other reasons listed).

Number of gatewaysPath with a higher number of next hops is available.

OriginPath with a lower origin code is available.

OSPF versionPath does not support the indicated OSPF version.

RIB preferenceRoute from a higher-numbered routing table is available.

Route destinguisher64-bit prefix added to IP subnets to make them unique.

Route metric or MED comparisonRoute with a lower metric or MED is available.

Route preferenceRoute with a lower preference value is available.

Router IDPath through a neighbor with a lower ID is available.

Unusable pathPath is not usable because of one of the following conditions: the route is damped,

the route is rejected by an import policy, or the route is unresolved.

Update sourceLast tiebreaker is the lowest IP address value.

Local AS

Autonomous system (AS) number of the local routing device.

Age

How long the route has been known.

AIGP

Accumulated interior gateway protocol (AIGP) BGP attribute.

Metric

Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.

MED-plus-IGP

Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.

TTL-Action

For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.
For sample output, see show route table.

Copyright 2015, Juniper Networks, Inc.

563

IS-IS Feature Guide for Routing Devices

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

Task

Name of the protocol that has added the route.

Announcement bits

List of protocols that announce this route. n-Resolve inet indicates that the route is used for route
resolution for next hops found in the routing table. n is an index used by Juniper Networks customer
support only.

AS path

AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:

IIGP.

EEGP.

RecordedThe AS path is recorded by the sample process (sampled).

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the local AS number associated with the AS path if more than one AS number

is configured on the routing device, or if AS path prepending is configured.

{ }Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.

A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
validation-state

(BGP-learned routes) Validation status of the route:

InvalidIndicates that the prefix is found, but either the corresponding AS received from the EBGP

peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.

UnknownIndicates that the prefix is not among the prefixes or prefix ranges in the database.

UnverifiedIndicates that origin validation is not enabled for the BGP peers.

ValidIndicates that the prefix and autonomous system pair are found in the database.

FECs bound to route

Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.

AS path: I <Originator>

(For route reflected output only) Originator ID attribute set by the route reflector.

564

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

route status

Indicates the status of a BGP route:

AcceptedThe specified BGP route is imported by the default BGP policy.

ImportThe route is imported into a Layer 3 VPN routing instance.

Import-ProtectA remote instance egress that is protected.

MultipathA BGP multipath active route.

MultipathContribThe route is not active but contributes to the BGP multipath.

ProtectAn egress route that is protected.

StaleA route that is marked stale due to graceful restart.

Primary Upstream

When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.

RPF Nexthops

When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.

Label

Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.

weight

Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.

VC Label

MPLS label assigned to the Layer 2 circuit virtual connection.

MTU

Maximum transmission unit (MTU) of the Layer 2 circuit.

VLAN ID

VLAN identifier of the Layer 2 circuit.

Cluster list

(For route reflected output only) Cluster ID sent by the route reflector.

Originator ID

(For route reflected output only) Address of router that originally sent the route to the route reflector.

Prefixes bound to route

Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.

Communities

Community path attribute for the route. See the Output Field table in the show route detail command
for all possible values for this field.

Layer2-info: encaps

Layer 2 encapsulation (for example, VPLS).

control flags

Control flags: none or Site Down.

mtu

Maximum transmission unit (MTU) information.

Label-Base, range

First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.

Copyright 2015, Juniper Networks, Inc.

565

IS-IS Feature Guide for Routing Devices

Table 36: show route extensive Output Fields (continued)


Field Name

Field Description

status vector

Layer 2 VPN and VPLS network layer reachability information (NLRI).

Localpref

Local preference value included in the route.

Router ID

BGP router ID as advertised by the neighbor in the open message.

Primary Routing Table

In a routing table group, the name of the primary routing table in which the route resides.

Secondary Tables

In a routing table group, the name of one or more secondary tables in which the route resides.

Originating RIB

Name of the routing table whose active route was used to determine the forwarding next-hop entry
in the resolution database. For example, in the case of inet.0 resolving through inet.0 and inet.3, this
field indicates which routing table, inet.0 or inet.3, provided the best path for a particular prefix.

Node path count

Number of nodes in the path.

Forwarding nexthops

Number of forwarding next hops. The forwarding next hop is the network layer address of the directly
reachable neighboring system (if applicable) and the interface used to reach it.

Sample Output
show route extensive
user@host> show route extensive
inet.0: 22 destinations, 23 routes (21 active, 0 holddown, 1 hidden)
10.10.0.0/16 (1 entry, 1 announced)
TSI:
KRT in-kernel 10.10.0.0/16 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 29
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 1:34:06
Task: RT
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
10.31.1.0/30 (2 entries, 1 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 2
Next hop: via so-0/3/0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:32:40
Task: IF
Announcement bits (1): 3-Resolve tree 2
AS path: I
OSPF
Preference: 10
Next-hop reference count: 1
Next hop: via so-0/3/0.0, selected

566

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

State: <Int>
Inactive reason: Route Preference
Local AS:
69
Age: 1:32:40
Metric: 1
Area: 0.0.0.0
Task: OSPF
AS path: I
10.31.1.1/32 (1 entry, 1 announced)
*Local Preference: 0
Next hop type: Local
Next-hop reference count: 7
Interface: so-0/3/0.0
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:32:43
Task: IF
Announcement bits (1): 3-Resolve tree 2
AS path: I
...
10.31.2.0/30 (1 entry, 1 announced)
TSI:
KRT in-kernel 10.31.2.0/30 -> {10.31.1.6}
*OSPF
Preference: 10
Next-hop reference count: 9
Next hop: via so-0/3/0.0
Next hop: 10.31.1.6 via ge-3/1/0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:32:19
Metric: 2
Area: 0.0.0.0
Task: OSPF
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
...
224.0.0.2/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 224.0.0.2/32 -> {}
*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:08
Task: PIM Recv
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
...
224.0.0.22/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 224.0.0.22/32 -> {}
*IGMP
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:06

Copyright 2015, Juniper Networks, Inc.

567

IS-IS Feature Guide for Routing Devices

Task: IGMP
Announcement bits (2): 0-KRT 3-Resolve tree 2
AS path: I
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
10.255.70.103/32 (1 entry, 1 announced)
State: <FlashAll>
*RSVP
Preference: 7
Next-hop reference count: 6
Next hop: 10.31.1.6 via ge-3/1/0.0 weight 0x1, selected
Label-switched-path green-r1-r3
Label operation: Push 100096
State: <Active Int>
Local AS:
69
Age: 1:28:12
Metric: 2
Task: RSVP
Announcement bits (2): 1-Resolve tree 1 2-Resolve tree 2
AS path: I
10.255.71.238/32 (1 entry, 1 announced)
State: <FlashAll>
*RSVP
Preference: 7
Next-hop reference count: 6
Next hop: via so-0/3/0.0 weight 0x1, selected
Label-switched-path green-r1-r2
State: <Active Int>
Local AS:
69
Age: 1:28:12
Metric: 1
Task: RSVP
Announcement bits (2): 1-Resolve tree 1 2-Resolve tree 2
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
...
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
47.0005.80ff.f800.0000.0108.0001.0102.5507.1052/152 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:34:07
Task: IF
AS path: I
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
0
(1 entry, 1 announced)
TSI:
KRT in-kernel 0
/36 -> {}
*MPLS
Preference: 0
Next hop type: Receive
Next-hop reference count: 6
State: <Active Int>
Local AS:
69
Age: 1:34:08
Metric: 1

568

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Task: MPLS
Announcement bits (1): 0-KRT
AS path: I
...
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
299840 (1 entry, 1 announced)
TSI:
KRT in-kernel 299840 /52 -> {indirect(1048575)}
*RSVP
Preference: 7/2
Next hop type: Flood
Address: 0x9174a30
Next-hop reference count: 4
Next hop type: Router, Next hop index: 798
Address: 0x9174c28
Next-hop reference count: 2
Next hop: 8.0.0.2 via lt-1/2/0.9 weight 0x1
Label-switched-path R2-to-R4-2p2mp
Label operation: Pop
Next hop type: Router, Next hop index: 1048574
Address: 0x92544f0
Next-hop reference count: 2
Next hop: 7.0.0.2 via lt-1/2/0.7 weight 0x1
Label-switched-path R2-to-R200-p2mp
Label operation: Pop
Next hop: 6.0.0.2 via lt-1/2/0.5 weight 0x8001
Label operation: Pop
State: <Active Int>
Age: 1:29
Metric: 1
Task: RSVP
Announcement bits (1): 0-KRT
AS path: I...
800010 (1 entry, 1 announced)
TSI:
KRT in-kernel 800010 /36 -> {vt-3/2/0.32769}
*VPLS
Preference: 7
Next-hop reference count: 2
Next hop: via vt-3/2/0.32769, selected
Label operation: Pop
State: <Active Int>
Age: 1:31:53
Task: Common L2 VC
Announcement bits (1): 0-KRT
AS path: I
vt-3/2/0.32769 (1 entry, 1 announced)
TSI:
KRT in-kernel vt-3/2/0.32769.0
/16 -> {indirect(1048574)}
*VPLS
Preference: 7
Next-hop reference count: 2
Next hop: 10.31.1.6 via ge-3/1/0.0 weight 0x1, selected
Label-switched-path green-r1-r3
Label operation: Push 800012, Push 100096(top)
Protocol next hop: 10.255.70.103
Push 800012
Indirect next hop: 87272e4 1048574
State: <Active Int>
Age: 1:31:53
Metric2: 2

Copyright 2015, Juniper Networks, Inc.

569

IS-IS Feature Guide for Routing Devices

Task: Common L2 VC
Announcement bits (2): 0-KRT 1-Common L2 VC
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Indirect next hops: 1
Protocol next hop: 10.255.70.103 Metric: 2
Push 800012
Indirect next hop: 87272e4 1048574
Indirect path forwarding next hops: 1
Next hop: 10.31.1.6 via ge-3/1/0.0 weight 0x1
10.255.70.103/32 Originating RIB: inet.3
Metric: 2
Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.31.1.6 via ge-3/1/0.0
inet6.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
abcd::10:255:71:52/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Active Int>
Local AS:
69
Age: 1:34:07
Task: IF
AS path: I
fe80::280:42ff:fe10:f179/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:07
Task: IF
AS path: I
ff02::2/128 (1 entry, 1 announced)
TSI:
KRT in-kernel ff02::2/128 -> {}
*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:08
Task: PIM Recv6
Announcement bits (1): 0-KRT
AS path: I
ff02::d/128 (1 entry, 1 announced)
TSI:
KRT in-kernel ff02::d/128 -> {}
*PIM
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:08
Task: PIM Recv6

570

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Announcement bits (1): 0-KRT


AS path: I
ff02::16/128 (1 entry, 1 announced)
TSI:
KRT in-kernel ff02::16/128 -> {}
*MLD
Preference: 0
Next-hop reference count: 18
State: <Active NoReadvrt Int>
Local AS:
69
Age: 1:34:06
Task: MLD
Announcement bits (1): 0-KRT
AS path: I
private.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
fe80::280:42ff:fe10:f179/128 (1 entry, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.16385, selected
State: <Active NoReadvrt Int>
Age: 1:34:07
Task: IF
AS path: I
green.l2vpn.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
10.255.70.103:1:3:1/96 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.70.103:1
Next-hop reference count: 7
Source: 10.255.70.103
Protocol next hop: 10.255.70.103
Indirect next hop: 2 no-forward
State: <Secondary Active Int Ext>
Local AS:
69 Peer AS:
69
Age: 1:28:12
Metric2: 1
Task: BGP_69.10.255.70.103+179
Announcement bits (1): 0-green-l2vpn
AS path: I
Communities: target:11111:1 Layer2-info: encaps:VPLS,
control flags:, mtu: 0
Label-base: 800008, range: 8
Localpref: 100
Router ID: 10.255.70.103
Primary Routing Table bgp.l2vpn.0
10.255.71.52:1:1:1/96 (1 entry, 1 announced)
TSI:
Page 0 idx 0 Type 1 val 8699540
*L2VPN Preference: 170/-1
Next-hop reference count: 5
Protocol next hop: 10.255.71.52
Indirect next hop: 0 State: <Active Int Ext>
Age: 1:34:03
Metric2: 1
Task: green-l2vpn
Announcement bits (1): 1-BGP.0.0.0.0+179
AS path: I

Copyright 2015, Juniper Networks, Inc.

571

IS-IS Feature Guide for Routing Devices

Communities: Layer2-info: encaps:VPLS, control flags:Site-Down,


mtu: 0
Label-base: 800016, range: 8, status-vector: 0x9F
10.255.71.52:1:5:1/96 (1 entry, 1 announced)
TSI:
Page 0 idx 0 Type 1 val 8699528
*L2VPN Preference: 170/-101
Next-hop reference count: 5
Protocol next hop: 10.255.71.52
Indirect next hop: 0 State: <Active Int Ext>
Age: 1:34:03
Metric2: 1
Task: green-l2vpn
Announcement bits (1): 1-BGP.0.0.0.0+179
AS path: I
Communities: Layer2-info: encaps:VPLS, control flags:, mtu: 0
Label-base: 800008, range: 8, status-vector: 0x9F
...
l2circuit.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
TSI:
10.245.255.63:CtrlWord:4:3:Local/96 (1 entry, 1 announced)
*L2CKT Preference: 7
Next hop: via so-1/1/2.0 weight 1, selected
Label-switched-path my-lsp
Label operation: Push 100000[0]
Protocol next hop: 10.245.255.63 Indirect next hop: 86af000 296
State: <Active Int>
Local AS:
99
Age: 10:21
Task: l2 circuit
Announcement bits (1): 0-LDP
AS path: I
VC Label 100000, MTU 1500, VLAN ID 512

55.0.0.0/24 (1 entry, 1 announced)


TSI:
KRT queued (pending) add
55.0.0.0/24 -> {Push 300112}
*BGP
Preference: 170/-101
Next hop type: Router
Address: 0x925c208
Next-hop reference count: 2
Source: 10.0.0.9
Next hop: 10.0.0.9 via ge-1/2/0.15, selected
Label operation: Push 300112
Label TTL action: prop-ttl
State: <Active Ext>
Local AS: 7019 Peer AS: 13979
Age: 1w0d 23:06:56
AIGP: 25
Task: BGP_13979.10.0.0.9+56732
Announcement bits (1): 0-KRT
AS path: 13979 7018 I
Accepted
Route Label: 300112

572

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Localpref: 100
Router ID: 10.9.9.1

show route extensive (Access Route)


user@host> show route 13.160.0.102 extensive
inet.0: 39256 destinations, 39258 routes (39255 active, 0 holddown, 1 hidden)
13.160.0.102/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 13.160.0.102/32 -> {13.160.0.2}
OSPF area : 0.0.0.0, LSA ID : 13.160.0.102, LSA type : Extern
*Access Preference: 13
Next-hop reference count: 78472
Next hop: 13.160.0.2 via fe-0/0/0.0, selected
State: <Active Int>
Age: 12
Task: RPD Unix Domain Server./var/run/rpd_serv.local
Announcement bits (2): 0-KRT 1-OSPFv2
AS path: I

show route extensive (BGP PIC Edge)


user@host> show route 1.1.1.6 extensive
ed.inet.0: 6 destinations, 9 routes (6 active, 0 holddown, 0 hidden)
1.1.1.6/32 (3 entries, 2 announced)
State: <CalcForwarding>
TSI:
KRT in-kernel 1.1.1.6/32 -> {indirect(1048574), indirect(1048577)}
Page 0 idx 0 Type 1 val 9219e30
Nexthop: Self
AS path: [2] 3 I
Communities: target:2:1
Path 1.1.1.6 from 1.1.1.4 Vector len 4. Val: 0
..
#Multipath Preference: 255
Next hop type: Indirect
Address: 0x93f4010
Next-hop reference count: 2
..
Protocol next hop: 1.1.1.4
Push 299824
Indirect next hop: 944c000 1048574 INH Session ID: 0x3
Indirect next hop: weight 0x1
Protocol next hop: 1.1.1.5
Push 299824
Indirect next hop: 944c1d8 1048577 INH Session ID: 0x4
Indirect next hop: weight 0x4000
State: <ForwardingOnly Int Ext)>
Inactive reason: Forwarding use only
Age: 25
Metric2: 15
Validation State: unverified
Task: RT
Announcement bits (1): 0-KRT
AS path: 3 I
Communities: target:2:1

show route extensive (FRR and LFA)


user@host> show route 20:31:2:0 extensive
inet.0: 46 destinations, 49 routes (45 active, 0 holddown, 1 hidden)
20.31.2.0/24 (2 entries, 1 announced)
State: FlashAll

Copyright 2015, Juniper Networks, Inc.

573

IS-IS Feature Guide for Routing Devices

TSI:
KRT in-kernel 20.31.2.0/24 -> {Push 299776, Push 299792}
*RSVP
Preference: 7/1
Next hop type: Router, Next hop index: 1048574
Address: 0xbbbc010
Next-hop reference count: 5
Next hop: 10.31.1.2 via ge-2/1/8.0 weight 0x1, selected
Label-switched-path europa-d-to-europa-e
Label operation: Push 299776
Label TTL action: prop-ttl
Session Id: 0x201
Next hop: 10.31.2.2 via ge-2/1/4.0 weight 0x4001
Label-switched-path europa-d-to-europa-e
Label operation: Push 299792
Label TTL action: prop-ttl
Session Id: 0x202
State: Active Int
Local AS:
100
Age: 5:31 Metric: 2
Task: RSVP
Announcement bits (1): 0-KRT
AS path: I
OSPF
Preference: 10
Next hop type: Router, Next hop index: 615
Address: 0xb9d78c4
Next-hop reference count: 7
Next hop: 10.31.1.2 via ge-2/1/8.0, selected
Session Id: 0x201
State: Int
Inactive reason: Route Preference
Local AS:
100
Age: 5:35 Metric: 3
Area: 0.0.0.0
Task: OSPF
AS path: I

show route extensive (Route Reflector)


user@host> show route extensive
1.0.0.0/8 (1 entry, 1 announced)
TSI:
KRT in-kernel 1.0.0.0/8 -> {indirect(40)}
*BGP
Preference: 170/-101
Source: 192.168.4.214
Protocol next hop: 207.17.136.192 Indirect next hop: 84ac908 40
State: <Active Int Ext>
Local AS: 10458 Peer AS: 10458
Age: 3:09
Metric: 0
Metric2: 0
Task: BGP_10458.192.168.4.214+1033
Announcement bits (2): 0-KRT 4-Resolve inet.0
AS path: 3944 7777 I <Originator>
Cluster list: 1.1.1.1
Originator ID: 10.255.245.88
Communities: 7777:7777
Localpref: 100
Router ID: 4.4.4.4
Indirect next hops: 1
Protocol next hop: 207.17.136.192 Metric: 0
Indirect next hop: 84ac908 40

574

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Indirect path forwarding next hops: 0


Next hop type: Discard

show route label detail (Multipoint LDP Inband Signaling for Point-to-Multipoint LSPs)
user@host> show route label 299872 detail
mpls.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)
299872 (1 entry, 1 announced)
*LDP
Preference: 9
Next hop type: Flood
Next-hop reference count: 3
Address: 0x9097d90
Next hop: via vt-0/1/0.1
Next-hop index: 661
Label operation: Pop
Address: 0x9172130
Next hop: via so-0/0/3.0
Next-hop index: 654
Label operation: Swap 299872
State: **Active Int>
Local AS: 1001
Age: 8:20
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
FECs bound to route: P2MP root-addr 10.255.72.166, grp 232.1.1.1,
src 192.168.142.2

show route label detail (Multipoint LDP with Multicast-Only Fast Reroute)
user@host> show route label 301568 detail
mpls.0: 18 destinations, 18 routes (18 active, 0 holddown, 0 hidden)
301568 (1 entry, 1 announced)
*LDP
Preference: 9
Next hop type: Flood
Address: 0x2735208
Next-hop reference count: 3
Next hop type: Router, Next hop index: 1397
Address: 0x2735d2c
Next-hop reference count: 3
Next hop: 1.3.8.2 via ge-1/2/22.0
Label operation: Pop
Load balance label: None;
Next hop type: Router, Next hop index: 1395
Address: 0x2736290
Next-hop reference count: 3
Next hop: 1.3.4.2 via ge-1/2/18.0
Label operation: Pop
Load balance label: None;
State: <Active Int AckRequest MulticastRPF>
Local AS:
10
Age: 54:05
Metric: 1
Validation State: unverified
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
FECs bound to route: P2MP root-addr 1.1.1.1, grp: 232.1.1.1, src:
192.168.219.11
Primary Upstream : 1.1.1.3:0--1.1.1.2:0
RPF Nexthops :

Copyright 2015, Juniper Networks, Inc.

575

IS-IS Feature Guide for Routing Devices

ge-1/2/15.0, 1.2.94.1, Label: 301568, weight: 0x1


ge-1/2/14.0, 1.2.3.1, Label: 301568, weight: 0x1
Backup Upstream : 1.1.1.3:0--1.1.1.6:0
RPF Nexthops :
ge-1/2/20.0, 1.2.96.1, Label: 301584, weight: 0xfffe
ge-1/2/19.0, 1.3.6.1, Label: 301584, weight: 0xfffe

576

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route forwarding-table


List of Syntax

Syntax on page 577


Syntax (MX Series Routers) on page 577
Syntax (TX Matrix and TX Matrix Plus Routers) on page 577

Syntax

show route forwarding-table


<detail | extensive | summary>
<all>
<ccc interface-name>
<destination destination-prefix>
<family family | matching matching>
<interface-name interface-name>
<label name>
<matching matching>
<multicast>
<table (default | logical-system-name/routing-instance-name | routing-instance-name)>
<vlan (all | vlan-name)>
<vpn vpn>

Syntax (MX Series


Routers)

show route forwarding-table


<detail | extensive | summary>
<all>
<bridge-domain (all | domain-name)>
<ccc interface-name>
<destination destination-prefix>
<family family | matching matching>
<interface-name interface-name>
<label name>
<learning-vlan-id learning-vlan-id>
<matching matching>
<multicast>
<table (default | logical-system-name/routing-instance-name | routing-instance-name)>
<vlan (all | vlan-name)>
<vpn vpn>

Syntax (TX Matrix and


TX Matrix Plus
Routers)

Release Information

show route forwarding-table


<detail | extensive | summary>
<all>
<ccc interface-name>
<destination destination-prefix>
<family family | matching matching>
<interface-name interface-name>
<matching matching>
<label name>
<lcc number>
<multicast>
<table routing-instance-name>
<vpn vpn>

Command introduced before Junos OS Release 7.4.


Option bridge-domain introduced in Junos OS Release 7.5
Option learning-vlan-id introduced in Junos OS Release 8.4

Copyright 2015, Juniper Networks, Inc.

577

IS-IS Feature Guide for Routing Devices

Options all and vlan introduced in Junos OS Release 9.6.


Command introduced in Junos OS Release 11.3 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Description

Display the Routing Engine's forwarding table, including the network-layer prefixes and
their next hops. This command is used to help verify that the routing protocol process
has relayed the correction information to the forwarding table. The Routing Engine
constructs and maintains one or more routing tables. From the routing tables, the Routing
Engine derives a table of active routes, called the forwarding table.

NOTE: The Routing Engine copies the forwarding table to the Packet
Forwarding Engine, the part of the router that is responsible for forwarding
packets. To display the entries in the Packet Forwarding Engine's forwarding
table, use the show pfe route command.

Options

noneDisplay the routes in the forwarding tables. By default, the show route
forwarding-table command does not display information about private, or internal,

forwarding tables.
detail | extensive | summary(Optional) Display the specified level of output.
all(Optional) Display routing table entries for all forwarding tables, including private,

or internal, tables.
bridge-domain (all | bridge-domain-name)(MX Series routers only) (Optional) Display

route entries for all bridge domains or the specified bridge domain.
ccc interface-name(Optional) Display route entries for the specified circuit cross-connect

interface.
destination destination-prefix(Optional) Destination prefix.
family family(Optional) Display routing table entries for the specified family:
fibre-channel, fmembers, inet, inet6, iso, mpls, tnp, unix, vpls, or vlan-classification.
interface-name interface-name(Optional) Display routing table entries for the specified

interface.
label name(Optional) Display route entries for the specified label.
lcc number(TX Matrix and TX matrix Plus routers only) (Optional) On a routing matrix

composed of a TX Matrix router and T640 routers, display information for the
specified T640 router (or line-card chassis) connected to the TX Matrix router. On
a routing matrix composed of the TX Matrix Plus router and T1600 or T4000 routers,
display information for the specified router (line-card chassis) connected to the TX
Matrix Plus router.

578

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Replace number with the following values depending on the LCC configuration:

0 through 3, when T640 routers are connected to a TX Matrix router in a routing


matrix.

0 through 3, when T1600 routers are connected to a TX Matrix Plus router in a


routing matrix.

0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.

0, 2, 4, or 6, when T4000 routers are connected to a TX Matrix Plus router with


3D SIBs in a routing matrix.

learning-vlan-id learning-vlan-id(MX Series routers only) (Optional) Display learned

information for all VLANs or for the specified VLAN.


matching matching(Optional) Display routing table entries matching the specified prefix

or prefix length.
multicast(Optional) Display routing table entries for multicast routes.
table (default | logical-system-name/routing-instance-name |
routing-instance-name)(Optional) Display route entries for all the routing tables in

the main routing instance or for the specified routing instance. If your device supports
logical systems, you can also display route entries for the specified logical system
and routing instance. To view the routing instances on your device, use the show
route instance command.
vlan (all | vlan-name)(Optional) Display information for all VLANs or for the specified

VLAN.
vpn vpn(Optional) Display routing table entries for a specified VPN.

Required Privilege
Level
List of Sample Output

view

show route forwarding-table on page 582


show route forwarding-table detail on page 583
show route forwarding-table destination extensive (Weights and Balances) on page 583
show route forwarding-table extensive on page 584
show route forwarding-table extensive (RPF) on page 585
show route forwarding-table family mpls on page 586
show route forwarding-table family vpls on page 586
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM)
hashing is enabled) on page 586
show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM)
hashing is enabled with MAC Statistics) on page 587
show route forwarding-table family vpls extensive on page 587
show route forwarding-table table default on page 588
show route forwarding-table table
logical-system-name/routing-instance-name on page 589

Copyright 2015, Juniper Networks, Inc.

579

IS-IS Feature Guide for Routing Devices

show route forwarding-table vpn on page 590


Output Fields

Table 37 on page 580 lists the output fields for the show route forwarding-table command.
Output fields are listed in the approximate order in which they appear. Field names might
be abbreviated (as shown in parentheses) when no level of output is specified, or when
the detail keyword is used instead of the extensive keyword.

Table 37: show route forwarding-table Output Fields


Field Name

Field Description

Level of Output

Logical system

Name of the logical system. This field is displayed if you specify the table
logical-system-name/routing-instance-name option on a device that is configured
for and supports logical systems.

All levels

Routing table

Name of the routing table (for example, inet, inet6, mpls).

All levels

Address family

Address family (for example, IP, IPv6, ISO, MPLS, and VPLS).

All levels

Destination

Destination of the route.

detail extensive

Route Type (Type)

How the route was placed into the forwarding table. When the detail keyword
is used, the route type might be abbreviated (as shown in parentheses):

All levels

cloned (clon)(TCP or multicast only) Cloned route.

destination (dest)Remote addresses directly reachable through an interface.

destination down (iddn)Destination route for which the interface is

unreachable.

interface cloned (ifcl)Cloned route for which the interface is unreachable.

route down (ifdn)Interface route for which the interface is unreachable.

ignore (ignr)Ignore this route.

interface (intf)Installed as a result of configuring an interface.

permanent (perm)Routes installed by the kernel when the routing table is

initialized.

userRoutes installed by the routing protocol process or as a result of the

configuration.
Route Reference
(RtRef)

Number of routes to reference.

detail extensive

Flags

Route type flags:

extensive

noneNo flags are enabled.

accountingRoute has accounting enabled.

cachedCache route.

incoming-iface interface-numberCheck against incoming interface.

prefix load balanceLoad balancing is enabled for this prefix.

rt nh decoupledRoute has been decoupled from the next hop to the

destination.

Next hop

580

sent to PFERoute has been sent to the Packet Forwarding Engine.

staticStatic route.

IP address of the next hop to the destination.

detail extensive

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 37: show route forwarding-table Output Fields (continued)


Field Name

Field Description

Level of Output

Next hop Type


(Type)

Next-hop type. When the detail keyword is used, the next-hop type might be
abbreviated (as indicated in parentheses):

detail extensive

broadcast (bcst)Broadcast.

denyDeny.

discard (dscd) Discard.

holdNext hop is waiting to be resolved into a unicast or multicast type.

indexed (idxd)Indexed next hop.

indirect (indr)Indirect next hop.

local (locl)Local address on an interface.

routed multicast (mcrt)Regular multicast next hop.

multicast (mcst)Wire multicast next hop (limited to the LAN).

multicast discard (mdsc)Multicast discard.

multicast group (mgrp)Multicast group member.

receive (recv)Receive.

reject (rjct)Discard. An ICMP unreachable message was sent.

resolve (rslv)Resolving the next hop.

unicast (ucst)Unicast.

unilist (ulst)List of unicast next hops. A packet sent to this next hop goes

to any next hop in the list.


Index

Software index of the next hop that is used to route the traffic for a given prefix.

detail extensive none

Route
interface-index

Logical interface index from which the route is learned. For example, for interface
routes, this is the logical interface index of the route itself. For static routes, this
field is zero. For routes learned through routing protocols, this is the logical
interface index from which the route is learned.

extensive

Reference (NhRef)

Number of routes that refer to this next hop.

detail extensive none

Next-hop interface
(Netif)

Interface used to reach the next hop.

detail extensive none

Weight

Value used to distinguish primary, secondary, and fast reroute backup routes.
Weight information is available when MPLS label-switched path (LSP) link
protection, node-link protection, or fast reroute is enabled, or when the standby
state is enabled for secondary paths. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible (see the Balance
field description).

extensive

Balance

Balance coefficient indicating how traffic of unequal cost is distributed among


next hops when a router is performing unequal-cost load balancing. This
information is available when you enable BGP multipath load balancing.

extensive

RPF interface

List of interfaces from which the prefix can be accepted. Reverse path forwarding
(RPF) information is displayed only when rpf-check is configured on the interface.

extensive

Copyright 2015, Juniper Networks, Inc.

581

IS-IS Feature Guide for Routing Devices

Sample Output
show route forwarding-table
user@host> show route forwarding-table
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
default
perm
0
0.0.0.0/32
perm
0
1.1.1.0/24
ifdn
0
1.1.1.0/32
iddn
0 1.1.1.0
1.1.1.1/32
user
0
1.1.1.1/32
intf
0 1.1.1.1
1.1.1.1/32
iddn
0 1.1.1.1
1.1.1.255/32
iddn
0 ff:ff:ff:ff:ff:ff
10.0.0.0/24
intf
0
10.0.0.0/32
dest
0 10.0.0.0
10.0.0.1/32
intf
0 10.0.0.1
10.0.0.1/32
dest
0 10.0.0.1
10.0.0.255/32
dest
0 10.0.0.255
10.1.1.0/24
ifdn
0
10.1.1.0/32
iddn
0 10.1.1.0
10.1.1.1/32
user
0
10.1.1.1/32
intf
0 10.1.1.1
10.1.1.1/32
iddn
0 10.1.1.1
10.1.1.255/32
iddn
0 ff:ff:ff:ff:ff:ff
10.206.0.0/16
user
0 10.209.63.254
10.209.0.0/16
user
1 0:12:1e:ca:98:0
10.209.0.0/18
intf
0
10.209.0.0/32
dest
0 10.209.0.0
10.209.2.131/32
intf
0 10.209.2.131
10.209.2.131/32
dest
0 10.209.2.131
10.209.17.55/32
dest
0 0:30:48:5b:78:d2
10.209.63.42/32
dest
0 0:23:7d:58:92:ca
10.209.63.254/32
dest
0 0:12:1e:ca:98:0
10.209.63.255/32
dest
0 10.209.63.255
10.227.0.0/16
user
0 10.209.63.254

Type Index NhRef Netif


rjct
46
4
dscd
44
1
rslv
608
1 ge-2/0/1.0
recv
606
1 ge-2/0/1.0
rjct
46
4
locl
607
2
locl
607
2
bcst
605
1 ge-2/0/1.0
rslv
616
1 ge-2/0/0.0
recv
614
1 ge-2/0/0.0
locl
615
2
locl
615
2
bcst
613
1 ge-2/0/0.0
rslv
612
1 ge-2/0/1.0
recv
610
1 ge-2/0/1.0
rjct
46
4
locl
611
2
locl
611
2
bcst
609
1 ge-2/0/1.0
ucst
419
20 fxp0.0
ucst
419
20 fxp0.0
rslv
418
1 fxp0.0
recv
416
1 fxp0.0
locl
417
2
locl
417
2
ucst
435
1 fxp0.0
ucst
434
1 fxp0.0
ucst
419
20 fxp0.0
bcst
415
1 fxp0.0
ucst
419
20 fxp0.0

...
Routing table: iso
ISO:
Destination
Type RtRef Next hop
Type Index NhRef Netif
default
perm
0
rjct
27
1
47.0005.80ff.f800.0000.0108.0003.0102.5524.5220.00
intf
0
locl
28
1
Routing table: inet6
Internet6:
Destination
Type RtRef Next hop
default
perm
0
ff00::/8
perm
0
ff02::1/128
perm
0 ff02::1
Routing table: ccc
MPLS:
Interface.Label
Type RtRef Next hop
default
perm
0
100004(top)fe-0/0/1.0

582

Type Index NhRef Netif


rjct
6
1
mdsc
4
1
mcst
3
1

Type Index NhRef Netif


rjct 16
1

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route forwarding-table detail


user@host> show route forwarding-table detail
Routing table: inet
Internet:
Destination
Type RtRef Next hop
default
user
2 0:90:69:8e:b1:1b
default
perm
0
10.1.1.0/24
intf
0 ff.3.0.21
10.1.1.0/32
dest
0 10.1.1.0
10.1.1.1/32
intf
0 10.1.1.1
10.1.1.255/32
dest
0 10.1.1.255
10.21.21.0/24
intf
0 ff.3.0.21
10.21.21.0/32
dest
0 10.21.21.0
10.21.21.1/32
intf
0 10.21.21.1
10.21.21.255/32
dest
0 10.21.21.255
127.0.0.1/32
intf
0 127.0.0.1
172.17.28.19/32
clon
1 192.168.4.254
172.17.28.44/32
clon
1 192.168.4.254

Type Index NhRef Netif


ucst
132
4 fxp0.0
rjct
14
1
ucst
322
1 so-5/3/0.0
recv
324
1 so-5/3/0.0
locl
321
1
bcst
323
1 so-5/3/0.0
ucst
326
1 so-5/3/0.0
recv
328
1 so-5/3/0.0
locl
325
1
bcst
327
1 so-5/3/0.0
locl
320
1
ucst
132
4 fxp0.0
ucst
132
4 fxp0.0

...
Routing table: private1__.inet
Internet:
Destination
Type RtRef Next hop
default
perm
0
10.0.0.0/8
intf
0
10.0.0.0/32
dest
0 10.0.0.0
10.0.0.4/32
intf
0 10.0.0.4
10.0.0.4/32
dest
0 10.0.0.4

Type Index NhRef Netif


rjct
46
1
rslv
136
1 fxp1.0
recv
134
1 fxp1.0
locl
135
2
locl
135
2

...
Routing table: iso
ISO:
Destination
Type RtRef Next hop
default
perm
0

Type Index NhRef Netif


rjct
38
1

Routing table: inet6


Internet6:
Destination
Type RtRef Next hop
default
perm
0
ff00::/8
perm
0
ff02::1/128
perm
0 ff02::1

Type Index NhRef Netif


rjct
22
1
mdsc
21
1
mcst
17
1

...
Routing table: mpls
MPLS:
Destination
Type RtRef Next hop
default
perm
0

Type Index NhRef Netif


rjct 28
1

show route forwarding-table destination extensive (Weights and Balances)


user@host> show route forwarding-table destination 3.4.2.1 extensive
Routing table: inet [Index 0]
Internet:
Destination: 3.4.2.1/32
Route type: user
Route reference: 0

Copyright 2015, Juniper Networks, Inc.

Route interface-index: 0

583

IS-IS Feature Guide for Routing Devices

Flags: sent to PFE


Next-hop type: unilist
Nexthop: 4.4.4.4
Next-hop type: unicast
Next-hop interface: so-1/1/0.0
Nexthop: 145.12.1.2
Next-hop type: unicast
Next-hop interface: so-0/1/2.0

Index: 262143

Reference: 1

Index: 335
Weight: 22

Reference: 2
Balance: 3

Index: 337
Weight: 33

Reference: 2
Balance: 33

show route forwarding-table extensive


user@host> show route forwarding-table extensive
Routing table: inet [Index 0]
Internet:
Destination: default
Route type: user
Route reference: 2
Flags: sent to PFE
Nexthop: 0:90:69:8e:b1:1b
Next-hop type: unicast
Next-hop interface: fxp0.0
Destination: default
Route type: permanent
Route reference: 0
Flags: none
Next-hop type: reject
Destination: 127.0.0.1/32
Route type: interface
Route reference: 0
Flags: sent to PFE
Nexthop: 127.0.0.1
Next-hop type: local

Route interface-index: 0

Index: 132

Reference: 4

Route interface-index: 0
Index: 14

Reference: 1

Route interface-index: 0

Index: 320

Reference: 1

...
Routing table: private1__.inet [Index 1]
Internet:
Destination: default
Route type: permanent
Route reference: 0
Flags: sent to PFE
Next-hop type: reject
Destination: 10.0.0.0/8
Route type: interface
Route reference: 0
Flags: sent to PFE
Next-hop type: resolve
Next-hop interface: fxp1.0

Route interface-index: 0
Index: 46

Reference: 1

Route interface-index: 3
Index: 136

Reference: 1

...
Routing table: iso [Index 0]
ISO:
Destination: default
Route type: permanent

584

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Route reference: 0
Flags: sent to PFE
Next-hop type: reject

Route interface-index: 0
Index: 38

Reference: 1

Routing table: inet6 [Index 0]


Internet6:
Destination: default
Route type: permanent
Route reference: 0
Flags: sent to PFE
Next-hop type: reject

Route interface-index: 0

Destination: ff00::/8
Route type: permanent
Route reference: 0
Flags: sent to PFE
Next-hop type: multicast discard

Route interface-index: 0

Index: 22

Index: 21

Reference: 1

Reference: 1

...
Routing table: private1__.inet6 [Index 1]
Internet6:
Destination: default
Route type: permanent
Route reference: 0
Flags: sent to PFE
Next-hop type: reject

Route interface-index: 0
Index: 54

Reference: 1

Destination: fe80::2a0:a5ff:fe3d:375/128
Route type: interface
Route reference: 0
Route interface-index: 0
Flags: sent to PFE
Nexthop: fe80::2a0:a5ff:fe3d:375
Next-hop type: local
Index: 75
Reference: 1
...

show route forwarding-table extensive (RPF)


The next example is based on the following configuration, which enables an RPF check
on all routes that are learned from this interface, including the interface route:
so-1/1/0 {
unit 0 {
family inet {
rpf-check;
address 15.95.1.2/30;
}
}
}
user@host> show route forwarding-table extensive
Routing table: inet [Index 0]
Internet:
...
...
Destination: 15.95.1.3/32
Route type: destination
Route reference: 0
Route interface-index: 67

Copyright 2015, Juniper Networks, Inc.

585

IS-IS Feature Guide for Routing Devices

Flags: sent to PFE


Nexthop: 15.95.1.3
Next-hop type: broadcast
Next-hop interface: so-1/1/0.0
RPF interface: so-1/1/0.0

Index: 328

Reference: 1

show route forwarding-table family mpls


user@host> show route forwarding-table family mpls
Routing table: mpls
MPLS:
Destination
Type RtRef Next hop
default
perm
0
0
user
0
1
user
0
2
user
0
100000
user
0 10.31.1.6
800002
user
0
vt-0/3/0.32770 (VPLS)
user

Type Index NhRef Netif


rjct
19
1
recv
18
3
recv
18
3
recv
18
3
swap 100001
fe-1/1/0.0
Pop
vt-0/3/0.32770

indr
351
4
Push 800000, Push 100002(top)

so-0/0/0.0

show route forwarding-table family vpls


user@host> show route forwarding-table family vpls
Routing table: green.vpls
VPLS:
Destination
Type RtRef Next hop
Type Index NhRef Netif
default
dynm
0
flood
353
1
default
perm
0
rjct
298
1
fe-0/1/0.0
dynm
0
flood
355
1
00:90:69:0c:20:1f/48
<<<<<Remote CE
dynm

so-0/0/0.0
00:90:69:85:b0:1f/48
dynm

indr
351
4
Push 800000, Push 100002(top)
<<<<<<Local CE

ucst

354

2 fe-0/1/0.0

show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM) hashing is enabled)
user@host> show route forwarding-table vpls
Routing table: green.vpls
VPLS:
Enabled protocols: BUM hashing
Destination
Type RtRef Next hop
default
perm
0
lsi.1048832
intf
0
4.4.3.2
ge-3/0/0.0
00:19:e2:25:d0:01/48 user
0
0x30003/51
user
0
ge-2/3/9.0
intf
0
ge-3/1/3.0
intf
0
0x30002/51
user
0
0x30001/51
user
0

586

Type Index
NhRef Netif
dscd
519
1
indr 1048574
4
Push 262145
621
2
ucst
comp
ucst
ucst
comp
comp

590
627
590
619
600
597

5 ge-2/3/9.0
2
5 ge-2/3/9.0
4 ge-3/1/3.0
2
2

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route forwarding-table vpls (Broadcast, unknown unicast, and multicast (BUM) hashing is enabled with
MAC Statistics)
user@host> show route forwarding-table vpls
Routing table: green.vpls
VPLS:
Enabled protocols: BUM hashing, MAC Stats
Destination
Type RtRef Next hop
default
perm
0
lsi.1048834
intf
0
4.4.3.2
ge-3/0/0.0
00:19:e2:25:d0:01/48 user
0
0x30003/51
user
0
ge-2/3/9.0
intf
0
ge-3/1/3.0
intf
0
0x30002/51
user
0
0x30001/51
user
0

Type Index
NhRef Netif
dscd
519
1
indr 1048574
4
Push 262145
592
2
ucst
comp
ucst
ucst
comp
comp

590
630
590
591
627
624

5 ge-2/3/9.0
2
5 ge-2/3/9.0
4 ge-3/1/3.0
2
2

show route forwarding-table family vpls extensive


user@host> show route forwarding-table family vpls extensive
Routing table: green.vpls [Index 2]
VPLS:
Destination: default
Route type: dynamic
Route reference: 0
Flags: sent to PFE
Next-hop type: flood
Next-hop type: unicast
Next-hop interface: fe-0/1/3.0
Next-hop type: unicast
Next-hop interface: fe-0/1/2.0
Destination: default
Route type: permanent
Route reference: 0
Flags: none
Next-hop type: discard
Destination: fe-0/1/2.0
Route type: dynamic
Route reference: 0
Flags: sent to PFE
Next-hop type: flood
Next-hop type: indirect
Next-hop type: Push 800016
Next-hop interface: at-1/0/1.0
Next-hop type: indirect
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0
Next-hop type: unicast
Next-hop interface: fe-0/1/3.0
Destination: fe-0/1/3.0
Route type: dynamic
Route reference: 0
Flags: sent to PFE
Next-hop type: flood

Copyright 2015, Juniper Networks, Inc.

Route interface-index: 72
Index: 289
Index: 291

Reference: 1
Reference: 3

Index: 290

Reference: 3

Route interface-index: 0
Index: 341

Reference: 1

Route interface-index: 69
Index: 293
Index: 363

Reference: 1
Reference: 4

Index: 301

Reference: 5

Index: 291

Reference: 3

Route interface-index: 70
Index: 292

Reference: 1

587

IS-IS Feature Guide for Routing Devices

Next-hop type: indirect


Next-hop type: Push 800016
Next-hop interface: at-1/0/1.0
Next-hop type: indirect
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0
Next-hop type: unicast
Next-hop interface: fe-0/1/2.0

Index: 363

Reference: 4

Index: 301

Reference: 5

Index: 290

Reference: 3

Destination: 10:00:00:01:01:01/48
Route type: dynamic
Route reference: 0
Route interface-index: 70
Flags: sent to PFE, prefix load balance
Next-hop type: unicast
Index: 291
Reference: 3
Next-hop interface: fe-0/1/3.0
Route used as destination:
Packet count:
6640
Byte count:
675786
Route used as source
Packet count:
6894
Byte count:
696424
Destination: 10:00:00:01:01:04/48
Route type: dynamic
Route reference: 0
Route interface-index: 69
Flags: sent to PFE, prefix load balance
Next-hop type: unicast
Index: 290
Reference: 3
Next-hop interface: fe-0/1/2.0
Route used as destination:
Packet count:
96
Byte count:
8079
Route used as source:
Packet count:
296
Byte count:
24955
Destination: 10:00:00:01:03:05/48
Route type: dynamic
Route reference: 0
Route interface-index: 74
Flags: sent to PFE, prefix load balance
Next-hop type: indirect
Index: 301
Reference: 5
Next hop: 10.31.3.2
Next-hop type: Push 800000
Next-hop interface: fe-0/1/1.0

show route forwarding-table table default


user@host> show route forwarding-table table default
Routing table: default.inet
Internet:
Destination
Type RtRef Next hop
default
perm
0
0.0.0.0/32
perm
0
10.0.60.0/30
user
0 10.0.60.13
10.0.60.12/30
intf
0
10.0.60.12/32
dest
0 10.0.60.12
10.0.60.13/32
dest
0 0:5:85:8b:bc:22
10.0.60.14/32
intf
0 10.0.60.14
10.0.60.14/32
dest
0 10.0.60.14
10.0.60.15/32
dest
0 10.0.60.15
10.0.67.12/30
user
0 10.0.60.13
10.0.80.0/30
ifdn
0 ff.3.0.21
10.0.80.0/32
dest
0 10.0.80.0
10.0.80.2/32
user
0
10.0.80.2/32
intf
0 10.0.80.2

588

Type Index NhRef Netif


rjct
36
2
dscd
34
1
ucst
713
5 fe-0/1/3.0
rslv
688
1 fe-0/1/3.0
recv
686
1 fe-0/1/3.0
ucst
713
5 fe-0/1/3.0
locl
687
2
locl
687
2
bcst
685
1 fe-0/1/3.0
ucst
713
5 fe-0/1/3.0
ucst
676
1 so-0/0/1.0
recv
678
1 so-0/0/1.0
rjct
36
2
locl
675
1

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

10.0.80.3/32
10.0.90.12/30
10.0.90.12/32
10.0.90.14/32
10.0.90.14/32
10.0.90.15/32
10.5.0.0/16
10.10.0.0/16
10.13.10.0/23
10.84.0.0/16
10.150.0.0/16
10.157.64.0/19
10.209.0.0/16

dest
intf
dest
intf
dest
dest
user
user
user
user
user
user
user

0
0
0
0
0
0
0
0
0
0
0
0
0

10.0.80.3
10.0.90.12
10.0.90.14
10.0.90.14
10.0.90.15
192.168.187.126
192.168.187.126
192.168.187.126
192.168.187.126
192.168.187.126
192.168.187.126
192.168.187.126

bcst
rslv
recv
locl
locl
bcst
ucst
ucst
ucst
ucst
ucst
ucst
ucst

677
684
682
683
683
681
324
324
324
324
324
324
324

1
1
1
2
2
1
15
15
15
15
15
15
15

so-0/0/1.0
fe-0/1/0.0
fe-0/1/0.0

fe-0/1/0.0
fxp0.0
fxp0.0
fxp0.0
fxp0.0
fxp0.0
fxp0.0
fxp0.0

...
Routing table: default.iso
ISO:
Destination
Type RtRef Next hop
default
perm
0

Type Index NhRef Netif


rjct
60
1

Routing table: default.inet6


Internet6:
Destination
Type RtRef Next hop
default
perm
0
::/128
perm
0
ff00::/8
perm
0
ff02::1/128
perm
0 ff02::1

Type Index NhRef Netif


rjct
44
1
dscd
42
1
mdsc
43
1
mcst
39
1

Routing table: default.mpls


MPLS:
Destination
Type RtRef Next hop
default
perm
0

Type Index NhRef Netif


dscd
50
1

show route forwarding-table table logical-system-name/routing-instance-name


user@host> show route forwarding-table table R4/vpn-red
Logical system: R4
Routing table: vpn-red.inet
Internet:
Destination
Type RtRef Next hop
Type Index NhRef Netif
default
perm
0
rjct
563
1
0.0.0.0/32
perm
0
dscd
561
2
1.0.0.1/32
user
0
dscd
561
2
2.0.2.0/24
intf
0
rslv
771
1 ge-1/2/0.3
2.0.2.0/32
dest
0 2.0.2.0
recv
769
1 ge-1/2/0.3
2.0.2.1/32
intf
0 2.0.2.1
locl
770
2
2.0.2.1/32
dest
0 2.0.2.1
locl
770
2
2.0.2.2/32
dest
0 0.4.80.3.0.1b.c0.d5.e4.bd.0.1b.c0.d5.e4.bc.8.0
ucst
789
1 ge-1/2/0.3
2.0.2.255/32
dest
0 2.0.2.255
bcst
768
1 ge-1/2/0.3
224.0.0.0/4
perm
1
mdsc
562
1
224.0.0.1/32
perm
0 224.0.0.1
mcst
558
1
255.255.255.255/32 perm
0
bcst
559
1
Logical system: R4
Routing table: vpn-red.iso
ISO:
Destination
Type RtRef Next hop
default
perm
0

Copyright 2015, Juniper Networks, Inc.

Type Index NhRef Netif


rjct
608
1

589

IS-IS Feature Guide for Routing Devices

Logical system: R4
Routing table: vpn-red.inet6
Internet6:
Destination
Type RtRef Next hop
default
perm
0
::/128
perm
0
ff00::/8
perm
0
ff02::1/128
perm
0 ff02::1

Type Index NhRef Netif


rjct
708
1
dscd
706
1
mdsc
707
1
mcst
704
1

Logical system: R4
Routing table: vpn-red.mpls
MPLS:
Destination
Type RtRef Next hop
default
perm
0

Type Index NhRef Netif


dscd
638

show route forwarding-table vpn


user@host> show route forwarding-table vpn VPN-A
Routing table:: VPN-A.inet
Internet:
Destination
Type RtRef Nexthop
default
perm
0
10.39.10.20/30
intf
0 ff.3.0.21
so-0/0/0.0
10.39.10.21/32
intf
0 10.39.10.21
10.255.14.172/32
user
0
so-0/0/0.0
10.255.14.175/32
user
0
100004(top) so-1/0/0.0
224.0.0.0/4
perm
224.0.0.1/32
perm
224.0.0.5/32
user
255.255.255.255/32 perm

590

2
0 224.0.0.1
1 224.0.0.5
0

Type Index NhRef Netif


rjct
4
4
ucst
40
1
locl
ucst

36
69

1
2

indr
81
3
Push 100004, Push
mdsc
mcst
mcst
bcst

5
1
1
2

3
8
8
3

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route hidden


Syntax

Release Information
Description

Options

show route hidden


<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>

Command introduced before Junos OS Release 7.4.


Display only hidden route information. A hidden route is unusable, even if it is the best
path.
brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

view

Understanding Hidden Routes

show route hidden on page 591


show route hidden detail on page 592
show route hidden extensive on page 592
show route hidden terse on page 592
For information about output fields, see the output field table for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route hidden
user@host> show route hidden
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
127.0.0.1/32
[Direct/0] 04:26:38
> via lo0.0
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
10.5.5.5/32
[BGP/170] 03:44:10, localpref 100, from 10.4.4.4
AS path: 100 I
Unusable
10.12.1.0/24
[BGP/170] 03:44:10, localpref 100, from 10.4.4.4
AS path: 100 I
Unusable

Copyright 2015, Juniper Networks, Inc.

591

IS-IS Feature Guide for Routing Devices

10.12.80.4/30

[BGP/170] 03:44:10, localpref 100, from 10.4.4.4


AS path: I
Unusable

...

show route hidden detail


user@host> show route hidden detail
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
127.0.0.1/32 (1 entry, 0 announced)
Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via lo0.0, selected
State: <Hidden Martian Int>
Local AS:
1
Age: 4:27:37
Task: IF
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)
Restart Complete
10.5.5.5/32 (1 entry, 0 announced)
BGP
Preference: 170/-101
Route Distinguisher: 10.4.4.4:4
Next hop type: Unusable
Next-hop reference count: 6
State: <Secondary Hidden Int Ext>
Local AS:
1 Peer AS:
1
Age: 3:45:09
Task: BGP_1.10.4.4.4+2493
AS path: 100 I
Communities: target:1:999
VPN Label: 100064
Localpref: 100
Router ID: 10.4.4.4
Primary Routing Table bgp.l3vpn.0
...

show route hidden extensive


The output for the show route hidden extensive command is identical to that of the show
route hidden detail command. For sample output, see show route hidden detail on
page 592.
show route hidden terse
user@host> show route hidden terse
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
127.0.0.1/32

592

P Prf
D
0

Metric 1

Metric 2

Next hop
>lo0.0

AS path

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
10.5.5.5/32
10.12.1.0/24
10.12.80.4/30

P
B
B
B

Prf
170
170
170

Metric 1
100
100
100

Metric 2

Next hop
Unusable
Unusable
Unusable

AS path
100 I
100 I
I

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l3vpn.0: 3 destinations, 3 routes (0 active, 0 holddown, 3 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
P Prf
10.4.4.4:4:10.5.5.5/32
B 170
10.4.4.4:4:10.12.1.0/24
B 170
10.4.4.4:4:10.12.80.4/30
B 170

Metric 1

Metric 2

Next hop

AS path

100

Unusable

100 I

100

Unusable

100 I

100

Unusable

inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


Restart Complete
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

593

IS-IS Feature Guide for Routing Devices

show route inactive-path


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description

Options

Syntax on page 594


Syntax (EX Series Switches) on page 594
show route inactive-path
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route inactive-path
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display routes for destinations that have no active route. An inactive route is a route that
was not selected as the best path.
noneDisplay all inactive routes.
brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
Related
Documentation
List of Sample Output

Output Fields

view

show route active-path on page 519

show route inactive-path on page 594


show route inactive-path detail on page 595
show route inactive-path extensive on page 596
show route inactive-path terse on page 596
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route inactive-path
user@host> show route inactive-path
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
10.12.100.12/30

594

[OSPF/10] 03:57:28, metric 1


> via so-0/3/0.0

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
10.0.0.0/8

[Direct/0] 04:39:56
> via fxp1.0

red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)


Restart Complete
+ = Active Route, - = Last Active, * = Both
10.12.80.0/30

[BGP/170] 04:38:17, localpref 100


AS path: 100 I
> to 10.12.80.1 via ge-6/3/2.0

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l3vpn.0: 3 destinations, 3 routes (0 active, 0 holddown, 3 hidden)
Restart Complete
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

show route inactive-path detail


user@host> show route inactive-path detail
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
10.12.100.12/30 (2 entries, 1 announced)
OSPF
Preference: 10
Next-hop reference count: 1
Next hop: via so-0/3/0.0, selected
State: <Int>
Inactive reason: Route Preference
Local AS:
1
Age: 3:58:24
Metric: 1
Area: 0.0.0.0
Task: OSPF
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
10.0.0.0/8 (2 entries, 0 announced)
Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via fxp1.0, selected
State: <NotBest Int>
Inactive reason: No difference
Age: 4:40:52
Task: IF
AS path: I

Copyright 2015, Juniper Networks, Inc.

595

IS-IS Feature Guide for Routing Devices

red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)


Restart Complete
10.12.80.0/30 (2 entries, 1 announced)
BGP
Preference: 170/-101
Next-hop reference count: 6
Source: 10.12.80.1
Next hop: 10.12.80.1 via ge-6/3/2.0, selected
State: <Ext>
Inactive reason: Route Preference
Peer AS:
100
Age: 4:39:13
Task: BGP_100.10.12.80.1+179
AS path: 100 I
Localpref: 100
Router ID: 10.0.0.0

show route inactive-path extensive


The output for the show route inactive-path extensive command is identical to that of
the show route inactive-path detail command. For sample output, see show route
inactive-path detail on page 595.
show route inactive-path terse
user@host> show route inactive-path terse
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
10.12.100.12/30

P Prf
O 10

Metric 1
1

Metric 2

Next hop
>so-0/3/0.0

AS path

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
A Destination
10.0.0.0/8

P Prf
D
0

Metric 1

Metric 2

Next hop
>fxp1.0

AS path

red.inet.0: 6 destinations, 8 routes (4 active, 0 holddown, 3 hidden)


Restart Complete
+ = Active Route, - = Last Active, * = Both
A Destination
10.12.80.0/30

P Prf
B 170

Metric 1
100

Metric 2

Next hop
>10.12.80.1

AS path
100 I

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l3vpn.0: 3 destinations, 3 routes (0 active, 0 holddown, 3 hidden)
Restart Complete
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete

596

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

597

IS-IS Feature Guide for Routing Devices

show route instance


List of Syntax

Syntax

Syntax (EX Series


Switches and QFX
Series)

Release Information

Description
Options

Syntax on page 598


Syntax (EX Series Switches and QFX Series) on page 598
show route instance
<brief | detail | summary>
<instance-name>
<logical-system (all | logical-system-name)>
<operational>
show route instance
<brief | detail | summary>
<instance-name>
<operational>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Command introduced in Junos OS Release 11.3 for the QFX Series.
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Display routing instance information.
none(Same as brief) Display standard information about all routing instances.
brief | detail | summary(Optional) Display the specified level of output. If you do not

specify a level of output, the system defaults to brief. (These options are not available
with the operational keyword.)
instance-name(Optional) Display information for all routing instances whose name

begins with this string (for example, cust1, cust11, and cust111 are all displayed when
you run the show route instance cust1 command).
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


operational(Optional) Display operational routing instances.

Required Privilege
Level
Related
Documentation

List of Sample Output

598

view

Example: Transporting IPv6 Traffic Across IPv4 Using Filter-Based Tunneling

Example: Configuring the Helper Capability Mode for OSPFv3 Graceful Restart

show route instance on page 600


show route instance detail (Graceful Restart Complete) on page 600
show route instance detail (Graceful Restart Incomplete) on page 602
show route instance detail (VPLS Routing Instance) on page 603
show route instance operational on page 604
show route instance summary on page 604

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Output Fields

Table 38 on page 599 lists the output fields for the show route instance command. Output
fields are listed in the approximate order in which they appear.

Table 38: show route instance Output Fields


Field Name

Field Description

Level of Output

Instance or instance-name

Name of the routing instance.

All levels

Operational Routing Instances

(operational keyword only) Names of all operational routing


instances.

Type

Type of routing instance: forwarding, l2vpn, no-forwarding, vpls,


virtual-router, or vrf.

All levels

State

State of the routing instance: active or inactive.

brief detail none

Interfaces

Name of interfaces belonging to this routing instance.

brief detail none

Restart State

Status of graceful restart for this instance: Pending or Complete.

detail

Path selection timeout

Maximum amount of time, in seconds, remaining until graceful


restart is declared complete. The default is 300.

detail

Tables

Tables (and number of routes) associated with this routing instance.

brief detail none

Route-distinguisher

Unique route distinguisher associated with this routing instance.

detail

Vrf-import

VPN routing and forwarding instance import policy name.

detail

Vrf-export

VPN routing and forwarding instance export policy name.

detail

Vrf-import-target

VPN routing and forwarding instance import target community


name.

detail

Vrf-export-target

VPN routing and forwarding instance export target community name.

detail

Vrf-edge-protection-id

Context identifier configured for edge-protection.

detail

Fast-reroute-priority

Fast reroute priority setting for a VPLS routing instance: high, medium,
or low. The default is low.

detail

Restart State

Restart state:

detail

Pending:protocol-nameList of protocols that have not yet

completed graceful restart for this routing table.

CompleteAll protocols have restarted for this routing table.

Primary rib

Primary table for this routing instance.

brief none summary

Active/holddown/hidden

Number of active, hold-down, and hidden routes.

All levels

Copyright 2015, Juniper Networks, Inc.

599

IS-IS Feature Guide for Routing Devices

Sample Output
show route instance
user@host> show route instance
Instance
Type
Primary RIB
master
forwarding
inet.0
iso.0
mpls.0
inet6.0
l2circuit.0
__juniper_private1__ forwarding
__juniper_private1__.inet.0
__juniper_private1__.inet6.0

Active/holddown/hidden
16/0/1
1/0/0
0/0/0
2/0/0
0/0/0
12/0/0
1/0/0

show route instance detail (Graceful Restart Complete)


user@host> show route instance detail
master:
Router ID: 10.255.14.176
Type: forwarding
State: Active
Restart State: Complete Path selection timeout: 300
Tables:
inet.0
: 17 routes (15 active, 0 holddown,
Restart Complete
inet.3
: 2 routes (2 active, 0 holddown, 0
Restart Complete
iso.0
: 1 routes (1 active, 0 holddown, 0
Restart Complete
mpls.0
: 19 routes (19 active, 0 holddown,
Restart Complete
bgp.l3vpn.0
: 10 routes (10 active, 0 holddown,
Restart Complete
inet6.0
: 2 routes (2 active, 0 holddown, 0
Restart Complete
bgp.l2vpn.0
: 1 routes (1 active, 0 holddown, 0
Restart Complete
BGP-INET:
Router ID: 10.69.103.1
Type: vrf
State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.103
Route-distinguisher: 10.255.14.176:103
Vrf-import: [ BGP-INET-import ]
Vrf-export: [ BGP-INET-export ]
Tables:
BGP-INET.inet.0
: 4 routes (4 active, 0 holddown, 0
Restart Complete
BGP-L:
Router ID: 10.69.104.1
Type: vrf
State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.104
Route-distinguisher: 10.255.14.176:104
Vrf-import: [ BGP-L-import ]
Vrf-export: [ BGP-L-export ]
Tables:

600

1 hidden)
hidden)
hidden)
0 hidden)
0 hidden)
hidden)
hidden)

hidden)

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

BGP-L.inet.0
: 4 routes (4
Restart Complete
BGP-L.mpls.0
: 3 routes (3
Restart Complete
L2VPN:
Router ID: 0.0.0.0
Type: l2vpn
State: Active
Restart State: Complete Path selection
Interfaces:
t3-0/0/0.512
Route-distinguisher: 10.255.14.176:512
Vrf-import: [ L2VPN-import ]
Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0
: 2 routes (2
Restart Complete
LDP:
Router ID: 10.69.105.1
Type: vrf
State: Active
Restart State: Complete Path selection
Interfaces:
t3-0/0/0.105
Route-distinguisher: 10.255.14.176:105
Vrf-import: [ LDP-import ]
Vrf-export: [ LDP-export ]
Tables:
LDP.inet.0
: 5 routes (4
Restart Complete
OSPF:
Router ID: 10.69.101.1
Type: vrf
State: Active
Restart State: Complete Path selection
Interfaces:
t3-0/0/0.101
Route-distinguisher: 10.255.14.176:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Vrf-import-target: [ target:11111
Tables:
OSPF.inet.0
: 8 routes (7
Restart Complete
RIP:
Router ID: 10.69.102.1
Type: vrf
State: Active
Restart State: Complete Path selection
Interfaces:
t3-0/0/0.102
Route-distinguisher: 10.255.14.176:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
RIP.inet.0
: 6 routes (6
Restart Complete
STATIC:
Router ID: 10.69.100.1
Type: vrf
State: Active
Restart State: Complete Path selection
Interfaces:
t3-0/0/0.100
Route-distinguisher: 10.255.14.176:100
Vrf-import: [ STATIC-import ]

Copyright 2015, Juniper Networks, Inc.

active, 0 holddown, 0 hidden)


active, 0 holddown, 0 hidden)

timeout: 300

active, 0 holddown, 0 hidden)

timeout: 300

active, 0 holddown, 0 hidden)

timeout: 300

active, 0 holddown, 0 hidden)

timeout: 300

active, 0 holddown, 0 hidden)

timeout: 300

601

IS-IS Feature Guide for Routing Devices

Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0
: 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete

show route instance detail (Graceful Restart Incomplete)


user@host> show route instance detail
master:
Router ID: 10.255.14.176
Type: forwarding
State: Active
Restart State: Pending Path selection timeout: 300
Tables:
inet.0
: 17 routes (15 active, 1 holddown,
Restart Pending: OSPF LDP
inet.3
: 2 routes (2 active, 0 holddown, 0
Restart Pending: OSPF LDP
iso.0
: 1 routes (1 active, 0 holddown, 0
Restart Complete
mpls.0
: 23 routes (23 active, 0 holddown,
Restart Pending: LDP VPN
bgp.l3vpn.0
: 10 routes (10 active, 0 holddown,
Restart Pending: BGP VPN
inet6.0
: 2 routes (2 active, 0 holddown, 0
Restart Complete
bgp.l2vpn.0
: 1 routes (1 active, 0 holddown, 0
Restart Pending: BGP VPN
BGP-INET:
Router ID: 10.69.103.1
Type: vrf
State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.103
Route-distinguisher: 10.255.14.176:103
Vrf-import: [ BGP-INET-import ]
Vrf-export: [ BGP-INET-export ]
Tables:
BGP-INET.inet.0
: 6 routes (5 active, 0 holddown, 0
Restart Pending: VPN
BGP-L:
Router ID: 10.69.104.1
Type: vrf
State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.104
Route-distinguisher: 10.255.14.176:104
Vrf-import: [ BGP-L-import ]
Vrf-export: [ BGP-L-export ]
Tables:
BGP-L.inet.0
: 6 routes (5 active, 0 holddown, 0
Restart Pending: VPN
BGP-L.mpls.0
: 2 routes (2 active, 0 holddown, 0
Restart Pending: VPN
L2VPN:
Router ID: 0.0.0.0
Type: l2vpn
State: Active
Restart State: Pending Path selection timeout: 300
Interfaces:
t3-0/0/0.512
Route-distinguisher: 10.255.14.176:512
Vrf-import: [ L2VPN-import ]

602

1 hidden)
hidden)
hidden)
0 hidden)
0 hidden)
hidden)
hidden)

hidden)

hidden)
hidden)

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0
: 2 routes (2
Restart Pending: VPN L2VPN
LDP:
Router ID: 10.69.105.1
Type: vrf
State: Active
Restart State: Pending Path selection
Interfaces:
t3-0/0/0.105
Route-distinguisher: 10.255.14.176:105
Vrf-import: [ LDP-import ]
Vrf-export: [ LDP-export ]
Tables:
LDP.inet.0
: 5 routes (4
Restart Pending: OSPF LDP VPN
OSPF:
Router ID: 10.69.101.1
Type: vrf
State: Active
Restart State: Pending Path selection
Interfaces:
t3-0/0/0.101
Route-distinguisher: 10.255.14.176:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Tables:
OSPF.inet.0
: 8 routes (7
Restart Pending: OSPF VPN
RIP:
Router ID: 10.69.102.1
Type: vrf
State: Active
Restart State: Pending Path selection
Interfaces:
t3-0/0/0.102
Route-distinguisher: 10.255.14.176:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
RIP.inet.0
: 8 routes (6
Restart Pending: RIP VPN
STATIC:
Router ID: 10.69.100.1
Type: vrf
State: Active
Restart State: Pending Path selection
Interfaces:
t3-0/0/0.100
Route-distinguisher: 10.255.14.176:100
Vrf-import: [ STATIC-import ]
Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0
: 4 routes (4
Restart Pending: VPN

active, 0 holddown, 0 hidden)

timeout: 300

active, 1 holddown, 0 hidden)

timeout: 300

active, 1 holddown, 0 hidden)

timeout: 300

active, 2 holddown, 0 hidden)

timeout: 300

active, 0 holddown, 0 hidden)

show route instance detail (VPLS Routing Instance)


user@host> show route instance detail test-vpls
test-vpls:
Router ID: 0.0.0.0
Type: vpls
State: Active
Interfaces:
lsi.1048833

Copyright 2015, Juniper Networks, Inc.

603

IS-IS Feature Guide for Routing Devices

lsi.1048832
fe-0/1/0.513
Route-distinguisher: 10.255.37.65:1
Vrf-import: [ __vrf-import-test-vpls-internal__ ]
Vrf-export: [ __vrf-export-test-vpls-internal__ ]
Vrf-import-target: [ target:300:1 ]
Vrf-export-target: [ target:300:1 ]
Vrf-edge-protection-id: 166.1.3.1 Fast-reroute-priority: high
Tables:
test-vpls.l2vpn.0
: 3 routes (3 active, 0 holddown, 0 hidden)

show route instance operational


user@host> show route instance operational
Operational Routing Instances:
master
default

show route instance summary


user@host> show route instance summary
Instance
Type
Primary rib
master
forwarding
inet.0
iso.0
mpls.0
l3vpn.0
inet6.0
l2vpn.0
l2circuit.0
BGP-INET
vrf
BGP-INET.inet.0
BGP-INET.iso.0
BGP-INET.inet6.0
BGP-L
vrf
BGP-L.inet.0
BGP-L.iso.0
BGP-L.mpls.0
BGP-L.inet6.0
L2VPN
l2vpn
L2VPN.inet.0
L2VPN.iso.0
L2VPN.inet6.0
L2VPN.l2vpn.0
LDP
vrf
LDP.inet.0
LDP.iso.0
LDP.mpls.0
LDP.inet6.0
LDP.l2circuit.0
OSPF
vrf
OSPF.inet.0
OSPF.iso.0
OSPF.inet6.0
RIP
vrf
RIP.inet.0
RIP.iso.0
RIP.inet6.0
STATIC
vrf
STATIC.inet.0

604

Active/holddown/hidden
15/0/1
1/0/0
35/0/0
0/0/0
2/0/0
0/0/0
0/0/0
5/0/0
0/0/0
0/0/0
5/0/0
0/0/0
4/0/0
0/0/0
0/0/0
0/0/0
0/0/0
2/0/0
4/0/0
0/0/0
0/0/0
0/0/0
0/0/0
7/0/0
0/0/0
0/0/0
6/0/0
0/0/0
0/0/0
4/0/0

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

STATIC.iso.0
STATIC.inet6.0

Copyright 2015, Juniper Networks, Inc.

0/0/0
0/0/0

605

IS-IS Feature Guide for Routing Devices

show route next-hop


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description

Options

Syntax on page 606


Syntax (EX Series Switches) on page 606
show route next-hop next-hop
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route next-hop next-hop
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display the entries in the routing table that are being sent to the specified next-hop
address.
brief | detail | extensive | terse(Optional) Display the specified level of ouput.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


next-hopNext-hop address.

Required Privilege
Level
List of Sample Output

Output Fields

view

show route next-hop on page 606


show route next-hop detail on page 607
show route next-hop extensive on page 609
show route next-hop terse on page 610
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or the
show route terse command.

Sample Output
show route next-hop
user@host> show route next-hop 192.168.71.254
inet.0: 18 destinations, 18 routes (17 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
10.10.0.0/16
10.209.0.0/16
172.16.0.0/12
192.168.0.0/16

606

*[Static/5] 06:26:25
> to 192.168.71.254 via fxp0.0
*[Static/5] 06:26:25
> to 192.168.71.254 via fxp0.0
*[Static/5] 06:26:25
> to 192.168.71.254 via fxp0.0
*[Static/5] 06:26:25

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

192.168.102.0/23
207.17.136.0/24
207.17.136.192/32

> to 192.168.71.254
*[Static/5] 06:26:25
> to 192.168.71.254
*[Static/5] 06:26:25
> to 192.168.71.254
*[Static/5] 06:26:25
> to 192.168.71.254

via fxp0.0
via fxp0.0
via fxp0.0
via fxp0.0

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


red.inet.0: 4 destinations, 5 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

show route next-hop detail


user@host> show route next-hop 192.168.71.254 detail
inet.0: 18 destinations, 18 routes (17 active, 0 holddown, 1 hidden)
Restart Complete
10.10.0.0/16 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
10.209.0.0/16 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
172.16.0.0/12 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2

Copyright 2015, Juniper Networks, Inc.

607

IS-IS Feature Guide for Routing Devices

AS path: I
192.168.0.0/16 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
192.168.102.0/23 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
207.17.136.0/24 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
207.17.136.192/32 (1 entry, 1 announced)
*Static Preference: 5
Next-hop reference count: 36
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
1
Age: 6:27:41
Task: RT
Announcement bits (3): 0-KRT 3-Resolve tree 1 5-Resolve tree 2
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
red.inet.0: 4 destinations, 5 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

608

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route next-hop extensive


user@host> show route next-hop 192.168.71.254 extensive
inet.0: 18 destinations, 18 routes (17 active, 0 holddown, 1 hidden)
10.10.0.0/16 (1 entry, 1 announced)
TSI:
KRT in-kernel 10.10.0.0/16 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
10.209.0.0/16 (1 entry, 1 announced)
TSI:
KRT in-kernel 10.209.0.0/16 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
172.16.0.0/12 (1 entry, 1 announced)
TSI:
KRT in-kernel 172.16.0.0/12 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
192.168.0.0/16 (1 entry, 1 announced)
TSI:
KRT in-kernel 192.168.0.0/16 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
192.168.102.0/23 (1 entry, 1 announced)
TSI:
KRT in-kernel 192.168.102.0/23 -> {192.168.71.254}
*Static Preference: 5

Copyright 2015, Juniper Networks, Inc.

609

IS-IS Feature Guide for Routing Devices

Next-hop reference count: 22


Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
207.17.136.0/24 (1 entry, 1 announced)
TSI:
KRT in-kernel 207.17.136.0/24 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
207.17.136.192/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 207.17.136.192/32 -> {192.168.71.254}
*Static Preference: 5
Next-hop reference count: 22
Next hop: 192.168.71.254 via fxp0.0, selected
State: <Active NoReadvrt Int Ext>
Local AS:
69
Age: 2:02:28
Task: RT
Announcement bits (1): 0-KRT
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
green.l2vpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
red.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

show route next-hop terse


user@host> show route next-hop 192.168.71.254 terse
inet.0: 25 destinations, 26 routes (24 active, 0 holddown, 1 hidden)
Restart Complete
+ = Active Route, - = Last Active, * = Both
A
*
*
*

610

Destination
10.10.0.0/16
10.209.0.0/16
172.16.0.0/12

P Prf
S
5
S
5
S
5

Metric 1

Metric 2

Next hop
>192.168.71.254
>192.168.71.254
>192.168.71.254

AS path

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

*
*
*
*

192.168.0.0/16
192.168.102.0/23
207.17.136.0/24
207.17.136.192/32

S
S
S
S

5
5
5
5

>192.168.71.254
>192.168.71.254
>192.168.71.254
>192.168.71.254

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


red.inet.0: 4 destinations, 5 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

611

IS-IS Feature Guide for Routing Devices

show route output


List of Syntax

Syntax on page 612


Syntax (EX Series Switches) on page 612

Syntax

show route output (address ip-address | interface interface-name)


<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>

Syntax (EX Series


Switches)

show route output (address ip-address | interface interface-name)


<brief | detail | extensive | terse>

Release Information

Description

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display the entries in the routing table learned through static routes and interior gateway
protocols that are to be sent out the interface with either the specified IP address or
specified name.
To view routes advertised to a neighbor or received from a neighbor for the BGP protocol,
use the show route advertising-protocol bgp and show route receive-protocol bgp
commands instead.

Options

address ip-addressDisplay entries in the routing table that are to be sent out the interface

with the specified IP address.


brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


interface interface-nameDisplay entries in the routing table that are to be sent out the

interface with the specified name.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level
List of Sample Output

Output Fields

612

view

show route output address on page 613


show route output address detail on page 613
show route output address extensive on page 614
show route output address terse on page 614
show route output interface on page 614
show route output interface detail on page 615
show route output interface extensive on page 615
show route output interface terse on page 615
For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Sample Output
show route output address
user@host> show route output address 36.1.1.1/24
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
36.1.1.0/24

*[Direct/0] 00:19:56
> via so-0/1/2.0
[OSPF/10] 00:19:55, metric 1
> via so-0/1/2.0

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

show route output address detail


user@host> show route output address 36.1.1.1 detail
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
36.1.1.0/24 (2 entries, 0 announced)
*Direct Preference: 0
Next hop type: Interface
Next-hop reference count: 1
Next hop: via so-0/1/2.0, selected
State: <Active Int>
Age: 23:00
Task: IF
AS path: I
OSPF
Preference: 10
Next-hop reference count: 1
Next hop: via so-0/1/2.0, selected
State: <Int>
Inactive reason: Route Preference
Age: 22:59
Metric: 1
Area: 0.0.0.0
Task: OSPF
AS path: I
private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

613

IS-IS Feature Guide for Routing Devices

show route output address extensive


The output for the show route output address extensive command is identical to that of
the show route output address detail command. For sample output, see show route
output address detail on page 613.
show route output address terse
user@host> show route output address 36.1.1.1 terse
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
A Destination
* 36.1.1.0/24

P Prf
D
0
O 10

Metric 1

Metric 2

Next hop
>so-0/1/2.0
>so-0/1/2.0

AS path

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

show route output interface


user@host> show route output interface so-0/1/2.0
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.71.240/32

10.255.71.241/32
14.1.1.0/24

16.1.1.0/24
36.1.1.0/24

*[OSPF/10] 00:13:00, metric 2


via so-0/1/2.0
> via so-0/3/2.0
*[OSPF/10] 00:13:10, metric 1
> via so-0/1/2.0
*[OSPF/10] 00:05:11, metric 3
to 35.1.1.2 via ge-3/1/0.0
> via so-0/1/2.0
via so-0/3/2.0
*[OSPF/10] 00:13:10, metric 2
> via so-0/1/2.0
*[Direct/0] 00:13:21
> via so-0/1/2.0
[OSPF/10] 00:13:20, metric 1
> via so-0/1/2.0

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

614

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route output interface detail


user@host> show route output interface so-0/1/2.0 detail
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
10.255.71.240/32 (1 entry, 1 announced)
*OSPF
Preference: 10
Next-hop reference count: 2
Next hop: via so-0/1/2.0
Next hop: via so-0/3/2.0, selected
State: <Active Int>
Age: 14:52
Metric: 2
Area: 0.0.0.0
Task: OSPF
Announcement bits (1): 0-KRT
AS path: I
10.255.71.241/32 (1 entry, 1 announced)
*OSPF
Preference: 10
Next-hop reference count: 4
Next hop: via so-0/1/2.0, selected
State: <Active Int>
Age: 15:02
Metric: 1
Area: 0.0.0.0
Task: OSPF
Announcement bits (1): 0-KRT
AS path: I
...

show route output interface extensive


The output for the show route output interface extensive command is identical to that of
the show route output interface detail command. For sample output, see show route
output interface detail on page 615.
show route output interface terse
user@host> show route output interface so-0/1/2.0 terse
inet.0: 28 destinations, 30 routes (27 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
A Destination
* 10.255.71.240/32

P Prf
O 10

Metric 1
2

* 10.255.71.241/32
* 14.1.1.0/24

O
O

10
10

1
3

* 16.1.1.0/24
* 36.1.1.0/24

O
D
O

10
0
10

2
1

Metric 2

Next hop
so-0/1/2.0
>so-0/3/2.0
>so-0/1/2.0
35.1.1.2
>so-0/1/2.0
so-0/3/2.0
>so-0/1/2.0
>so-0/1/2.0
>so-0/1/2.0

AS path

private1__.inet.0: 2 destinations, 3 routes (2 active, 0 holddown, 0 hidden)


iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

615

IS-IS Feature Guide for Routing Devices

private1__.inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)

616

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route protocol


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Syntax on page 617


Syntax (EX Series Switches) on page 617
show route protocol protocol
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route protocol protocol
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
opsf2 and ospf3 options introduced in Junos OS Release 9.2.
opsf2 and ospf3 options introduced in Junos OS Release 9.2 for EX Series switches.
flow option introduced in Junos OS Release 10.0.
flow option introduced in Junos OS Release 10.0 for EX Series switches.

Description

Display the route entries in the routing table that were learned from a particular protocol.

Options

brief | detail | extensive | terse(Optional) Display the specified level of output. If you do

not specify a level of output, the system defaults to brief.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


protocolProtocol from which the route was learned:

accessAccess route for use by DHCP application

access-internalAccess-internal route for use by DHCP application

aggregateLocally generated aggregate route

arpRoute learned through the Address Resolution Protocol

atmvpnAsynchronous Transfer Mode virtual private network

bgpBorder Gateway Protocol

cccCircuit cross-connect

directDirectly connected route

dvmrpDistance Vector Multicast Routing Protocol

esisEnd System-to-Intermediate System

flowLocally defined flow-specification route

frrPrecomputed protection route or backup route used when a link goes down

isisIntermediate System-to-Intermediate System

ldpLabel Distribution Protocol

l2circuitLayer 2 circuit

Copyright 2015, Juniper Networks, Inc.

617

IS-IS Feature Guide for Routing Devices

l2vpnLayer 2 virtual private network

localLocal address

mplsMultiprotocol Label Switching

msdpMulticast Source Discovery Protocol

ospfOpen Shortest Path First versions 2 and 3

ospf2Open Shortest Path First versions 2 only

ospf3Open Shortest Path First version 3 only

pimProtocol Independent Multicast

ripRouting Information Protocol

ripngRouting Information Protocol next generation

rsvpResource Reservation Protocol

rtargetLocal route target virtual private network

staticStatically defined route

tunnelDynamic tunnel

vpnVirtual private network

NOTE: EX Series switches run a subset of these protocols. See the switch
CLI for details.

Required Privilege
Level
List of Sample Output

618

view

show route protocol access on page 619


show route protocol access-internal extensive on page 619
show route protocol arp on page 619
show route protocol bgp on page 620
show route protocol bgp detail on page 620
show route protocol bgp extensive on page 620
show route protocol bgp terse on page 621
show route protocol direct on page 621
show route protocol frr on page 622
show route protocol l2circuit detail on page 622
show route protocol l2vpn extensive on page 623
show route protocol ldp on page 624
show route protocol ldp extensive on page 624
show route protocol ospf (Layer 3 VPN) on page 625
show route protocol ospf detail on page 626
show route protocol rip on page 626
show route protocol rip detail on page 626

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route protocol ripng table inet6 on page 627


show route protocol static detail on page 627
Output Fields

For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.

Sample Output
show route protocol access
user@host> show route protocol access
inet.0: 30380 destinations, 30382 routes (30379 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
13.160.0.3/32
13.160.0.4/32
13.160.0.5/32

*[Access/13] 00:00:09
> to 13.160.0.2 via fe-0/0/0.0
*[Access/13] 00:00:09
> to 13.160.0.2 via fe-0/0/0.0
*[Access/13] 00:00:09
> to 13.160.0.2 via fe-0/0/0.0

show route protocol access-internal extensive


user@host> show route protocol access-internal 13.160.0.19 extensive
inet.0: 100020 destinations, 100022 routes (100019 active, 0 holddown, 1 hidden)
13.160.0.19/32 (1 entry, 1 announced)
TSI:
KRT in-kernel 13.160.0.19/32 -> {13.160.0.2}
*Access-internal Preference: 12
Next-hop reference count: 200000
Next hop: 13.160.0.2 via fe-0/0/0.0, selected
State: <Active Int>
Age: 36
Task: RPD Unix Domain Server./var/run/rpd_serv.local
Announcement bits (1): 0-KRT
AS path: I

show route protocol arp


user@host> show route protocol arp
inet.0: 43 destinations, 43 routes (42 active, 0 holddown, 1 hidden)
inet.3: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
cust1.inet.0: 1033 destinations, 2043 routes (1033 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
20.20.1.3/32
20.20.1.4/32
20.20.1.5/32
20.20.1.6/32
20.20.1.7/32
20.20.1.8/32

Copyright 2015, Juniper Networks, Inc.

[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable

00:04:35, from 20.20.1.1


00:04:35, from 20.20.1.1
00:04:32, from 20.20.1.1
00:04:34, from 20.20.1.1
00:04:35, from 20.20.1.1
00:04:35, from 20.20.1.1

619

IS-IS Feature Guide for Routing Devices

20.20.1.9/32
20.20.1.10/32
20.20.1.11/32
20.20.1.12/32
20.20.1.13/32

[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable
[ARP/4294967293]
Unusable

00:04:35, from 20.20.1.1


00:04:35, from 20.20.1.1
00:04:33, from 20.20.1.1
00:04:33, from 20.20.1.1
00:04:33, from 20.20.1.1

...

show route protocol bgp


user@host> show route protocol bgp 192.168.64.0/21
inet.0: 335832 destinations, 335833 routes (335383 active, 0 holddown, 450 hidden)
+ = Active Route, - = Last Active, * = Both
192.168.64.0/21

*[BGP/170] 6d 10:41:16, localpref 100, from 192.168.69.71


AS path: 10458 14203 2914 4788 4788 I
> to 192.168.167.254 via fxp0.0

show route protocol bgp detail


user@host> show route protocol bgp 66.117.63.0/24 detail
inet.0: 335805 destinations, 335806 routes (335356 active, 0 holddown, 450 hidden)
66.117.63.0/24 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Next hop type: Indirect
Next-hop reference count: 1006436
Source: 192.168.69.71
Next hop type: Router, Next hop index: 324
Next hop: 192.168.167.254 via fxp0.0, selected
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
State: <Active Ext>
Local AS:
69 Peer AS: 10458
Age: 6d 10:42:42
Metric2: 0
Task: BGP_10458.192.168.69.71+179
Announcement bits (3): 0-KRT 2-BGP RT Background 3-Resolve tree
1
AS path: 10458 14203 2914 4788 4788 I
Communities: 2914:410 2914:2403 2914:3400
Accepted
Localpref: 100
Router ID: 207.17.136.192

show route protocol bgp extensive


user@host> show route protocol bgp 192.168.64.0/21 extensive
inet.0: 335827 destinations, 335828 routes (335378 active, 0 holddown, 450 hidden)
192.168.64.0/21 (1 entry, 1 announced)
TSI:
KRT in-kernel 1.9.0.0/16 -> {indirect(342)}
Page 0 idx 1 Type 1 val db31a80
Nexthop: Self
AS path: [69] 10458 14203 2914 4788 4788 I
Communities: 2914:410 2914:2403 2914:3400
Path 1.9.0.0 from 192.168.69.71 Vector len 4. Val: 1
*BGP
Preference: 170/-101
Next hop type: Indirect

620

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Next-hop reference count: 1006502


Source: 192.168.69.71
Next hop type: Router, Next hop index: 324
Next hop: 192.168.167.254 via fxp0.0, selected
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
State: <Active Ext>
Local AS:
69 Peer AS: 10458
Age: 6d 10:44:45
Metric2: 0
Task: BGP_10458.192.168.69.71+179
Announcement bits (3): 0-KRT 2-BGP RT Background 3-Resolve tree
1
AS path: 10458 14203 2914 4788 4788 I
Communities: 2914:410 2914:2403 2914:3400
Accepted
Localpref: 100
Router ID: 207.17.136.192
Indirect next hops: 1
Protocol next hop: 192.168.69.71
Indirect next hop: 8e166c0 342
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 192.168.167.254 via fxp0.0
192.168.0.0/16 Originating RIB: inet.0
Node path count: 1
Forwarding nexthops: 1
Nexthop: 192.168.167.254 via fxp0.0

show route protocol bgp terse


user@host> show route protocol bgp 192.168.64.0/21 terse
inet.0: 24 destinations, 32 routes (23 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
A Destination
192.168.64.0/21

P Prf
B 170

Metric 1
100

Metric 2

Next hop
>100.1.3.2

AS path
10023 21 I

show route protocol direct


user@host> show route protocol direct
inet.0: 335843 destinations, 335844 routes (335394 active, 0 holddown, 450 hidden)
+ = Active Route, - = Last Active, * = Both
8.8.8.0/24
10.255.165.1/32
30.30.30.0/24
192.168.164.0/22

*[Direct/0] 17w0d
> via fe-1/3/1.0
*[Direct/0] 25w4d
> via lo0.0
*[Direct/0] 17w0d
> via fe-1/3/2.0
*[Direct/0] 25w4d
> via fxp0.0

10:31:49
04:13:18
23:06:26
04:13:20

iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
47.0005.80ff.f800.0000.0108.0001.0102.5516.5001/152
*[Direct/0] 25w4d 04:13:21
> via lo0.0

Copyright 2015, Juniper Networks, Inc.

621

IS-IS Feature Guide for Routing Devices

inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
abcd::10:255:165:1/128
*[Direct/0] 25w4d 04:13:21
> via lo0.0
fe80::2a0:a5ff:fe12:ad7/128
*[Direct/0] 25w4d 04:13:21
> via lo0.0

show route protocol frr


user@host> show route protocol frr
inet.0: 43 destinations, 43 routes (42 active, 0 holddown, 1 hidden)
inet.3: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
cust1.inet.0: 1033 destinations, 2043 routes (1033 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
20.20.1.3/32

20.20.1.4/32

20.20.1.5/32

20.20.1.6/32

20.20.1.7/32

20.20.1.8/32

20.20.1.9/32

20.20.1.10/32
...

*[FRR/200] 00:05:38, from 20.20.1.1


> to 20.20.1.3 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:38, from 20.20.1.1
> to 20.20.1.4 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:35, from 20.20.1.1
> to 20.20.1.5 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:37, from 20.20.1.1
> to 20.20.1.6 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:38, from 20.20.1.1
> to 20.20.1.7 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:38, from 20.20.1.1
> to 20.20.1.8 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:38, from 20.20.1.1
> to 20.20.1.9 via ge-4/1/0.0
to 10.10.15.1 via ge-0/2/4.0, Push
*[FRR/200] 00:05:38, from 20.20.1.1

16, Push 299792(top)

16, Push 299792(top)

16, Push 299792(top)

16, Push 299792(top)

16, Push 299792(top)

16, Push 299792(top)

16, Push 299792(top)

show route protocol l2circuit detail


user@host> show route protocol l2circuit detail
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
100000 (1 entry, 1 announced)
*L2CKT Preference: 7
Next hop: via ge-2/0/0.0, selected
Label operation: Pop
Offset: 4
State: <Active Int>
Local AS:
99
Age: 9:52
Task: Common L2 VC
Announcement bits (1): 0-KRT
AS path: I
ge-2/0/0.0 (1 entry, 1 announced)

622

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

*L2CKT

Preference: 7
Next hop: via so-1/1/2.0 weight 1, selected
Label-switched-path my-lsp
Label operation: Push 100000, Push 100000(top)[0] Offset: -4
Protocol next hop: 10.245.255.63
Push 100000 Offset: -4
Indirect next hop: 86af0c0 298
State: <Active Int>
Local AS:
99
Age: 9:52
Task: Common L2 VC
Announcement bits (2): 0-KRT 1-Common L2 VC
AS path: I

l2circuit.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


10.245.255.63:CtrlWord:4:3:Local/96 (1 entry, 1 announced)
*L2CKT Preference: 7
Next hop: via so-1/1/2.0 weight 1, selected
Label-switched-path my-lsp
Label operation: Push 100000[0]
Protocol next hop: 10.245.255.63 Indirect next hop: 86af000 296
State: <Active Int>
Local AS:
99
Age: 10:21
Task: l2 circuit
Announcement bits (1): 0-LDP
AS path: I
VC Label 100000, MTU 1500, VLAN ID 512

show route protocol l2vpn extensive


user@host> show route protocol l2vpn extensive
inet.0: 14 destinations, 15 routes (13 active, 0 holddown, 1 hidden)
inet.3: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 7 destinations, 7 routes (7 active, 0 holddown, 0 hidden)
800001 (1 entry, 1 announced)
TSI:
KRT in-kernel 800001 /36 -> {so-0/0/0.0}
*L2VPN Preference: 7
Next hop: via so-0/0/0.0 weight 49087 balance 97%, selected
Label operation: Pop
Offset: 4
State: <Active Int>
Local AS:
69
Age: 7:48
Task: Common L2 VC
Announcement bits (1): 0-KRT
AS path: I
so-0/0/0.0 (1 entry, 1 announced)
TSI:
KRT in-kernel so-0/0/0.0.0
/16 -> {indirect(288)}
*L2VPN Preference: 7
Next hop: via so-0/0/1.0, selected
Label operation: Push 800000 Offset: -4
Protocol next hop: 10.255.14.220

Copyright 2015, Juniper Networks, Inc.

623

IS-IS Feature Guide for Routing Devices

Push 800000 Offset: -4


Indirect next hop: 85142a0 288
State: <Active Int>
Local AS:
69
Age: 7:48
Task: Common L2 VC
Announcement bits (2): 0-KRT 1-Common L2 VC
AS path: I
Communities: target:69:1 Layer2-info: encaps:PPP,
control flags:2, mtu: 0

show route protocol ldp


user@host> show route protocol ldp
inet.0: 12 destinations, 13 routes (12 active, 0 holddown, 0 hidden)
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
192.168.16.1/32
192.168.17.1/32

*[LDP/9] 1d 23:03:35, metric 1


> via t1-4/0/0.0, Push 100000
*[LDP/9] 1d 23:03:35, metric 1
> via t1-4/0/0.0

private1__.inet.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)


mpls.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
100064
100064(S=0)
100080

*[LDP/9] 1d 23:03:35, metric 1


> via t1-4/0/0.0, Pop
*[LDP/9] 1d 23:03:35, metric 1
> via t1-4/0/0.0, Pop
*[LDP/9] 1d 23:03:35, metric 1
> via t1-4/0/0.0, Swap 100000

show route protocol ldp extensive


user@host> show route protocol ldp extensive
192.168.16.1/32 (1 entry, 1 announced)
State: <FlashAll>
*LDP
Preference: 9
Next-hop reference count: 3
Next hop: via t1-4/0/0.0, selected
Label operation: Push 100000
State: <Active Int>
Local AS: 65500
Age: 1d 23:03:58
Metric: 1
Task: LDP
Announcement bits (2): 0-Resolve tree 1 2-Resolve tree 2
AS path: I
192.168.17.1/32 (1 entry, 1 announced)
State: <FlashAll>
*LDP
Preference: 9
Next-hop reference count: 3
Next hop: via t1-4/0/0.0, selected
State: <Active Int>
Local AS: 65500
Age: 1d 23:03:58
Metric: 1
Task: LDP

624

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Announcement bits (2): 0-Resolve tree 1 2-Resolve tree 2


AS path: I
private1__.inet.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
mpls.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
100064 (1 entry, 1 announced)
TSI:
KRT in-kernel 100064 /36 -> {t1-4/0/0.0}
*LDP
Preference: 9
Next-hop reference count: 2
Next hop: via t1-4/0/0.0, selected
State: <Active Int>
Local AS: 65500
Age: 1d 23:03:58
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
Prefixes bound to route: 192.168.17.1/32
100064(S=0) (1 entry, 1 announced)
TSI:
KRT in-kernel 100064 /40 -> {t1-4/0/0.0}
*LDP
Preference: 9
Next-hop reference count: 2
Next hop: via t1-4/0/0.0, selected
Label operation: Pop
State: <Active Int>
Local AS: 65500
Age: 1d 23:03:58
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
100080 (1 entry, 1 announced)
TSI:
KRT in-kernel 100080 /36 -> {t1-4/0/0.0}
*LDP
Preference: 9
Next-hop reference count: 2
Next hop: via t1-4/0/0.0, selected
Label operation: Swap 100000
State: <Active Int>
Local AS: 65500
Age: 1d 23:03:58
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
Prefixes bound to route: 192.168.16.1/32

show route protocol ospf (Layer 3 VPN)


user@host> show route protocol ospf
inet.0: 40 destinations, 40 routes (39 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
10.39.1.4/30
10.39.1.8/30
10.255.14.171/32

Copyright 2015, Juniper Networks, Inc.

*[OSPF/10] 00:05:18, metric 4


> via t3-3/2/0.0
[OSPF/10] 00:05:18, metric 2
> via t3-3/2/0.0
*[OSPF/10] 00:05:18, metric 4

625

IS-IS Feature Guide for Routing Devices

10.255.14.179/32
224.0.0.5/32

> via t3-3/2/0.0


*[OSPF/10] 00:05:18, metric 2
> via t3-3/2/0.0
*[OSPF/10] 20:25:55, metric 1

VPN-AB.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)


+ = Active Route, - = Last Active, * = Both
10.39.1.16/30
10.255.14.173/32
224.0.0.5/32

[OSPF/10] 00:05:43, metric 1


> via so-0/2/2.0
*[OSPF/10] 00:05:43, metric 1
> via so-0/2/2.0
*[OSPF/10] 20:26:20, metric 1

show route protocol ospf detail


user@host> show route protocol ospf detail
VPN-AB.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.39.1.16/30 (2 entries, 0 announced)
OSPF
Preference: 10
Nexthop: via so-0/2/2.0, selected
State: <Int>
Inactive reason: Route Preference
Age: 6:25
Metric: 1
Area: 0.0.0.0
Task: VPN-AB-OSPF
AS path: I
Communities: Route-Type:0.0.0.0:1:0
...

show route protocol rip


user@host> show route protocol rip
inet.0: 26 destinations, 27 routes (25 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
VPN-AB.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.14.177/32
*[RIP/100] 20:24:34, metric 2
> to 10.39.1.22 via t3-0/2/2.0
224.0.0.9/32
*[RIP/100] 00:03:59, metric 1

show route protocol rip detail


user@host> show route protocol rip detail
inet.0: 26 destinations, 27 routes (25 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
VPN-AB.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.14.177/32 (1 entry, 1 announced)
*RIP
Preference: 100
Nexthop: 10.39.1.22 via t3-0/2/2.0, selected
State: <Active Int>
Age: 20:25:02
Metric: 2
Task: VPN-AB-RIPv2
Announcement bits (2): 0-KRT 2-BGP.0.0.0.0+179
AS path: I
Route learned from 10.39.1.22 expires in 96 seconds

626

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route protocol ripng table inet6


user@host> show route protocol ripng table inet6
inet6.0: 4215 destinations, 4215 routes (4214 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
1111::1/128
1111::2/128
1111::3/128
1111::4/128
1111::5/128
1111::6/128

*[RIPng/100] 02:13:33, metric 2


> to fe80::2a0:a5ff:fe3d:56 via
*[RIPng/100] 02:13:33, metric 2
> to fe80::2a0:a5ff:fe3d:56 via
*[RIPng/100] 02:13:33, metric 2
> to fe80::2a0:a5ff:fe3d:56 via
*[RIPng/100] 02:13:33, metric 2
> to fe80::2a0:a5ff:fe3d:56 via
*[RIPng/100] 02:13:33, metric 2
> to fe80::2a0:a5ff:fe3d:56 via
*[RIPng/100] 02:13:33, metric 2
> to fe80::2a0:a5ff:fe3d:56 via

t3-0/2/0.0
t3-0/2/0.0
t3-0/2/0.0
t3-0/2/0.0
t3-0/2/0.0
t3-0/2/0.0

show route protocol static detail


user@host> show route protocol static detail
inet.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
10.5.0.0/16 (1 entry, 1 announced)
*Static Preference: 5
Next hop type: Router, Next hop index: 324
Address: 0x9274010
Next-hop reference count: 27
Next hop: 192.168.187.126 via fxp0.0, selected
Session Id: 0x0
State: <Active NoReadvrt Int Ext>
Age: 7w3d 21:24:25
Validation State: unverified
Task: RT
Announcement bits (1): 0-KRT
AS path: I
10.10.0.0/16 (1 entry, 1 announced)
*Static Preference: 5
Next hop type: Router, Next hop index: 324
Address: 0x9274010
Next-hop reference count: 27
Next hop: 192.168.187.126 via fxp0.0, selected
Session Id: 0x0
State: <Active NoReadvrt Int Ext>
Age: 7w3d 21:24:25
Validation State: unverified
Task: RT
Announcement bits (1): 0-KRT
AS path: I
10.13.10.0/23 (1 entry, 1 announced)
*Static Preference: 5
Next hop type: Router, Next hop index: 324
Address: 0x9274010
Next-hop reference count: 27
Next hop: 192.168.187.126 via fxp0.0, selected
Session Id: 0x0
State: <Active NoReadvrt Int Ext>
Age: 7w3d 21:24:25
Validation State: unverified

Copyright 2015, Juniper Networks, Inc.

627

IS-IS Feature Guide for Routing Devices

Task: RT
Announcement bits (1): 0-KRT
AS path: I

628

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route receive-protocol


List of Syntax

Syntax on page 629


Syntax (EX Series Switches) on page 629

Syntax

show route receive-protocol protocol neighbor-address


<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)

Syntax (EX Series


Switches)

show route receive-protocol protocol neighbor-address


<brief | detail | extensive | terse>

Release Information

Description

Options

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display the routing information as it was received through a particular neighbor using a
particular dynamic routing protocol.
brief | detail | extensive | terse(Optional) Display the specified level of output.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


protocol neighbor-addressProtocol transmitting the route (bgp, dvmrp, msdp, pim, rip,

or ripng) and address of the neighboring router from which the route entry was
received.
Additional Information

Required Privilege
Level
List of Sample Output

Output Fields

The output displays the selected routes and the attributes with which they were received,
but does not show the effects of import policy on the routing attributes.
view

show route receive-protocol bgp on page 632


show route receive-protocol bgp extensive on page 632
show route receive-protocol bgp table extensive on page 632
show route receive-protocol bgp logical-system extensive on page 633
show route receive-protocol bgp detail (Layer 2 VPN) on page 634
show route receive-protocol bgp extensive (Layer 2 VPN) on page 634
show route receive-protocol bgp (Layer 3 VPN) on page 635
show route receive-protocol bgp detail (Layer 3 VPN) on page 635
show route receive-protocol bgp detail (Long-Lived Graceful Restart) on page 636
show route receive-protocol bgp extensive (Layer 3 VPN) on page 636
Table 39 on page 630 describes the output fields for the show route receive-protocol
command. Output fields are listed in the approximate order in which they appear.

Copyright 2015, Juniper Networks, Inc.

629

IS-IS Feature Guide for Routing Devices

Table 39: show route receive-protocol Output Fields


Field Name

Field Description

Level of Output

routing-table-name

Name of the routing tablefor example, inet.0.

All levels

number
destinations

Number of destinations for which there are routes in the routing table.

All levels

number routes

Number of routes in the routing table and total number of routes in the following
states:

All levels

active

holddown (routes that are in pending state before being declared inactive)

hidden (routes that are not used because of a routing policy)

Prefix

Destination prefix.

none brief

MED

Multiple exit discriminator value included in the route.

none brief

destination-prefix
(entry, announced)

Destination prefix. The entry value is the number of routes for this destination,
and the announced value is the number of routes being announced for this
destination.

detail extensive

Accepted
LongLivedStale

The LongLivedStale flag indicates that the route was marked LLGR-stale by
this router, as part of the operation of LLGR receiver mode. Either this flag or
the LongLivedStaleImport flag may be displayed for a route. Neither of these
flags are displayed at the same time as the Stale (ordinary GR stale) flag.

detail extensive

Accepted
LongLivedStaleImport

The LongLivedStaleImport flag indicates that the route was marked LLGR-stale
when it was received from a peer, or by import policy. Either this flag or the
LongLivedStale flag may be displayed for a route. Neither of these flags are
displayed at the same time as the Stale (ordinary GR stale) flag.

detail extensive

Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale
routes learned from configured neighbors and import into the inet.0 routing
table
ImportAccepted
LongLivedStaleImport

Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale
routes learned from configured neighbors and imported into the inet.0 routing
table

detail extensive

The LongLivedStaleImport flag indicates that the route was marked LLGR-stale
when it was received from a peer, or by import policy.
Route Distinguisher

64-bit prefix added to IP subnets to make them unique.

detail extensive

Label-Base, range

First label in a block of labels and label block size. A remote PE routing device
uses this first label when sending traffic toward the advertising PE routing device.

detail extensive

VPN Label

Virtual private network (VPN) label. Packets are sent between CE and PE routing
devices by advertising VPN labels. VPN labels transit over either an RSVP or an
LDP label-switched path (LSP) tunnel.

detail extensive

630

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 39: show route receive-protocol Output Fields (continued)


Field Name

Field Description

Level of Output

Next hop

Next hop to the destination. An angle bracket (>) indicates that the route is the
selected route.

All levels

Localpref or
Lclpref

Local preference value included in the route.

All levels

AS path

Autonomous system (AS) path through which the route was learned. The letters
at the end of the AS path indicate the path origin, providing an indication of the
state of the route at the point at which the AS path originated:

All levels

IIGP.

EEGP.

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the number that precedes the AS path. This number

represents the number of ASs present in the AS path, when calculated as


defined in RFC 4271. This value is used the AS-path merge process, as defined
in RFC 4893.

[ ]If more than one AS number is configured on the router, or if AS path

prepending is configured, brackets enclose the local AS number associated


with the AS path.

{ }Braces enclose AS sets, which are groups of AS numbers in which the

order does not matter. A set commonly results from route aggregation. The
numbers in each AS set are displayed in ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an
unrecognized attribute and associated hexadecimal value if BGP receives
attribute 128 (attribute set) and you have not configured an independent domain
in any routing instance.
Cluster list

(For route reflected output only) Cluster ID sent by the route reflector.

detail extensive

Originator ID

(For route reflected output only) Address of routing device that originally sent
the route to the route reflector.

detail extensive

Communities

Community path attribute for the route. See the Output Field table in the show
route detail command for all possible values for this field.

detail extensive

AIGP

Accumulated interior gateway protocol (AIGP) BGP attribute.

detail extensive

Attrset AS

Number, local preference, and path of the AS that originated the route. These
values are stored in the Attrset attribute at the originating routing device.

detail extensive

Layer2-info:
encaps

Layer 2 encapsulation (for example, VPLS).

detail extensive

control flags

Control flags: none or Site Down.

detail extensive

Copyright 2015, Juniper Networks, Inc.

631

IS-IS Feature Guide for Routing Devices

Table 39: show route receive-protocol Output Fields (continued)


Field Name

Field Description

Level of Output

mtu

Maximum transmission unit (MTU) of the Layer 2 circuit.

detail extensive

Sample Output
show route receive-protocol bgp
user@host> show route receive-protocol bgp 10.255.245.215
inet.0: 28 destinations,
Prefix
10.22.1.0/24
10.22.2.0/24

33 routes (27 active, 0 holddown, 1 hidden)


Next hop
MED
Lclpref
AS path
10.255.245.215
0
100
I
10.255.245.215
0
100
I

show route receive-protocol bgp extensive


user@host> show route receive-protocol bgp 10.255.245.63 extensive
inet.0: 244 destinations, 244 routes (243 active, 0 holddown, 1 hidden)
Prefix
Next hop
MED
Lclpref AS path
1.1.1.0/24 (1 entry, 1 announced)
Next hop: 10.0.50.3
Localpref: 100
AS path: I <Orginator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.45
165.3.0.0/16 (1 entry, 1 announced)
Next hop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.68
165.4.0.0/16 (1 entry, 1 announced)
Next hop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.45
195.1.2.0/24 (1 entry, 1 announced)
Next hop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.68
inet.2: 63 destinations, 63 routes (63 active, 0 holddown, 0 hidden)
Prefix
Next hop
MED
Lclpref AS path
inet.3: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
Prefix
Next hop
MED
Lclpref AS path
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Next hop
MED
Lclpref AS path
mpls.0: 48 destinations, 48 routes (48 active, 0 holddown, 0 hidden)

show route receive-protocol bgp table extensive


user@host> show route receive-protocol bgp 207.17.136.192 table inet.0 66.117.68.0/24 extensive
inet.0: 227315 destinations, 227316 routes (227302 active, 0 holddown, 13 hidden)
* 66.117.63.0/24 (1 entry, 1 announced)
Nexthop: 207.17.136.29

632

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Localpref: 100
AS path: AS2 PA[6]: 14203 2914 3356 29748 33437 AS_TRANS
AS path: AS4 PA[2]: 33437 393219
AS path: Merged[6]: 14203 2914 3356 29748 33437 393219 I
Communities: 2914:420

show route receive-protocol bgp logical-system extensive


user@host> show route receive-protocol bgp 10.0.0.9 logical-system PE4 extensive
inet.0: 12 destinations, 13 routes (12 active, 0 holddown, 0 hidden)
* 10.0.0.0/30 (1 entry, 1 announced)
Accepted
Route Label: 3
Nexthop: 10.0.0.9
AS path: 13979 I
* 10.0.0.4/30 (1 entry, 1 announced)
Accepted
Route Label: 3
Nexthop: 10.0.0.9
AS path: 13979 I
10.0.0.8/30 (2 entries, 1 announced)
Accepted
Route Label: 3
Nexthop: 10.0.0.9
AS path: 13979 I
* 10.9.9.1/32 (1 entry, 1 announced)
Accepted
Route Label: 3
Nexthop: 10.0.0.9
AS path: 13979 I
* 10.100.1.1/32 (1 entry, 1 announced)
Accepted
Route Label: 3
Nexthop: 10.0.0.9
AS path: 13979 I
* 44.0.0.0/24 (1 entry, 1 announced)
Accepted
Route Label: 300096
Nexthop: 10.0.0.9
AS path: 13979 I
AIGP: 203
* 55.0.0.0/24 (1 entry, 1 announced)
Accepted
Route Label: 300112
Nexthop: 10.0.0.9
AS path: 13979 7018 I
AIGP: 25
* 66.0.0.0/24 (1 entry, 1 announced)
Accepted
Route Label: 300144
Nexthop: 10.0.0.9
AS path: 13979 7018 I
* 99.0.0.0/24 (1 entry, 1 announced)

Copyright 2015, Juniper Networks, Inc.

633

IS-IS Feature Guide for Routing Devices

Accepted
Route Label: 300160
Nexthop: 10.0.0.9
AS path: 13979 7018 I

show route receive-protocol bgp detail (Layer 2 VPN)


user@host> show route receive-protocol bgp 10.255.14.171 detail
inet.0: 68 destinations, 68 routes (67 active, 0 holddown, 1 hidden)
Prefix
Nexthop
MED
Lclpref AS path
inet.3: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
mpls.0: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
frame-vpn.l2vpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0
hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.245.35:1:5:1/96 (1 entry, 1 announced)
Route Distinguisher: 10.255.245.35:1
Label-base : 800000, range : 4, status-vector : 0x0
Nexthop: 10.255.245.35
Localpref: 100
AS path: I
Communities: target:65299:100 Layer2-info: encaps:FRAME RELAY,
control flags: 0, mtu: 0
bgp.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.245.35:1:5:1/96 (1 entry, 0 announced)
Route Distinguisher: 10.255.245.35:1
Label-base : 800000, range : 4, status-vector : 0x0
Nexthop: 10.255.245.35
Localpref: 100
AS path: I
Communities: target:65299:100 Layer2-info: encaps:FRAME RELAY,
control flags:0, mtu: 0

show route receive-protocol bgp extensive (Layer 2 VPN)


user@host> show route receive-protocol bgp 10.255.14.171 extensive
inet.0: 68 destinations, 68 routes (67 active, 0 holddown, 1 hidden)
Prefix
Nexthop
MED
Lclpref AS path
inet.3: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
mpls.0: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
frame-vpn.l2vpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.245.35:1:5:1/96 (1 entry, 1 announced)
Route Distinguisher: 10.255.245.35:1
Label-base : 800000, range : 4, status-vector : 0x0
Nexthop: 10.255.245.35
Localpref: 100
AS path: I
Communities: target:65299:100 Layer2-info: encaps:FRAME RELAY,
control flags:0, mtu: 0
bgp.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path

634

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

10.255.245.35:1:5:1/96 (1 entry, 0 announced)


Route Distinguisher: 10.255.245.35:1
Label-base : 800000, range : 4, status-vector : 0x0
Nexthop: 10.255.245.35
Localpref: 100
AS path: I
Communities: target:65299:100 Layer2-info: encaps:FRAME RELAY,
control flags:0, mtu: 0

show route receive-protocol bgp (Layer 3 VPN)


user@host> show route receive-protocol bgp 10.255.14.171
inet.0: 33 destinations, 33 routes (32 active, 0 holddown, 1 hidden)
Prefix
Nexthop
MED
Lclpref AS path
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
VPN-A.inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.14.175/32
10.255.14.171
100 2 I
10.255.14.179/32
10.255.14.171
2
100 I
VPN-B.inet.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.14.175/32
10.255.14.171
100 2 I
10.255.14.177/32
10.255.14.171
100 I
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
mpls.0: 9 destinations, 9 routes (9 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
bgp.l3vpn.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
10.255.14.171:300:10.255.14.177/32
10.255.14.171
100 I
10.255.14.171:100:10.255.14.179/32
10.255.14.171
2
100 I
10.255.14.171:200:10.255.14.175/32
10.255.14.171
100 2 I

show route receive-protocol bgp detail (Layer 3 VPN)


user@host> show route receive-protocol bgp 10.255.14.174 detail
inet.0: 16 destinations, 17 routes (15 active, 0 holddown, 1 hidden)
inet.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
vpna.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
* 10.49.0.0/30 (1 entry, 1 announced)
Route Distinguisher: 10.255.14.176:2
VPN Label: 101264
Nexthop: 10.255.14.174
Localpref: 100
AS path: I
Communities: target:200:100
AttrSet AS: 100
Localpref: 100
AS path: I
* 10.255.14.172/32 (1 entry, 1 announced)
Route Distinguisher: 10.255.14.176:2
VPN Label: 101280
Nexthop: 10.255.14.174
Localpref: 100
AS path: I
Communities: target:200:100
AttrSet AS: 100

Copyright 2015, Juniper Networks, Inc.

635

IS-IS Feature Guide for Routing Devices

Localpref: 100
AS path: I
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
mpls.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
bgp.l3vpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
* 10.255.14.174:2:10.49.0.0/30 (1 entry, 0 announced)
Route Distinguisher: 10.255.14.174:2
VPN Label: 101264
Nexthop: 10.255.14.174
Localpref: 100
AS path: I
Communities: target:200:100
AttrSet AS: 100
Localpref: 100
AS path: I
* 10.255.14.174:2:10.255.14.172/32 (1 entry, 0 announced)
Route Distinguisher: 10.255.14.174:2
VPN Label: 101280
Nexthop: 10.255.14.174
Localpref: 100
AS path: I
Communities: target:200:100
AttrSet AS: 100
Localpref: 100
AS path: I
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)

show route receive-protocol bgp detail (Long-Lived Graceful Restart)


user@host> show route receive-protocol bgp 10.4.12.11 detail
bgp.l2vpn.0: 38 destinations, 39 routes (37 active, 0 holddown, 1 hidden)
* 1.1.1.4:100:1.1.1.4/96 AD (1 entry, 1 announced)
Accepted LongLivedStale LongLivedStaleImport
Nexthop: 10.4.12.11
Localpref: 100
AS path: I

show route receive-protocol bgp extensive (Layer 3 VPN)


user@host> show route receive-protocol bgp 10.255.245.63 extensive
inet.0: 244 destinations, 244 routes (243 active, 0 holddown, 1 hidden)
Prefix
Nexthop
MED
Lclpref AS path
1.1.1.0/24 (1 entry, 1 announced)
Nexthop: 10.0.50.3
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.45
165.3.0.0/16 (1 entry, 1 announced)
Nexthop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.68
165.4.0.0/16 (1 entry, 1 announced)
Nexthop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.45

636

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

195.1.2.0/24 (1 entry, 1 announced)


Nexthop: 111.222.5.254
Localpref: 100
AS path: I <Originator>
Cluster list: 10.2.3.1
Originator ID: 10.255.245.68
inet.2: 63 destinations, 63 routes (63 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
inet.3: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
iso.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Prefix
Nexthop
MED
Lclpref AS path
mpls.0: 48 destinations, 48 routes (48 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

637

IS-IS Feature Guide for Routing Devices

show route table


List of Syntax

Syntax

Syntax (EX Series


Switches)
Release Information

Description
Options

Syntax on page 638


Syntax (EX Series Switches) on page 638
show route table routing-table-name
<brief | detail | extensive | terse>
<logical-system (all | logical-system-name)>
show route table routing-table-name
<brief | detail | extensive | terse>

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Display the route entries in a particular routing table.
brief | detail | extensive | terse(Optional) Display the specified level of output.
logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


routing-table-nameDisplay route entries for all routing tables whose name begins with

this string (for example, inet.0 and inet6.0 are both displayed when you run the show
route table inet command).
Required Privilege
Level
Related
Documentation
List of Sample Output

638

view

show route summary

show route table bgp.l2.vpn on page 648


show route table bgp.l3vpn.0 on page 649
show route table bgp.l3vpn.0 detail on page 649
show route table bgp.rtarget.0 (When Proxy BGP Route Target Filtering Is
Configured) on page 650
show route table bgp.evpn.0 on page 651
show route table inet.0 on page 651
show route table inet.3 on page 652
show route table inet6.0 on page 652
show route table inet6.3 on page 652
show route table inetflow detail on page 652
show route table l2circuit.0 on page 653
show route table mpls on page 653
show route table mpls extensive on page 653
show route table mpls.0 on page 654
show route table mpls.0 detail (PTX Series) on page 654
show route table mpls.0 extensive (PTX Series) on page 655
show route table mpls.0 (RSVP RouteTransit LSP) on page 655

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route table vpls_1 detail on page 656


show route table vpn-a on page 656
show route table vpn-a.mdt.0 on page 656
show route table VPN-A detail on page 657
show route table VPN-AB.inet.0 on page 657
show route table VPN_blue.mvpn-inet6.0 on page 658
show route table vrf1.mvpn.0 extensive on page 658
show route table MVPN.mvpn.0 on page 658
show route table inetflow detail on page 659
Output Fields

Table 29 on page 514 describes the output fields for the show route table command.
Output fields are listed in the approximate order in which they appear.

Table 40: show route table Output Fields


Field Name

Field Description

routing-table-name

Name of the routing table (for example, inet.0).

Restart complete

All protocols have restarted for this routing table.


Restart state:

Pending:protocol-nameList of protocols that have not yet completed graceful restart for this

routing table.

CompleteAll protocols have restarted for this routing table.

For example, if the output shows

LDP.inet.0
: 5 routes (4 active, 1 holddown, 0 hidden)
Restart Pending: OSPF LDP VPN
This indicates that OSPF, LDP, and VPN protocols did not restart for LDP.inet.0 routing table.

vpls_1.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)


Restart Complete
This indicates that all protocols have restarted for vpls_1.l2vpn.0 routing table.

number destinations

Number of destinations for which there are routes in the routing table.

number routes

Number of routes in the routing table and total number of routes in the following states:

active (routes that are active)

holddown (routes that are in the pending state before being declared inactive)

hidden (routes that are not used because of a routing policy)

Copyright 2015, Juniper Networks, Inc.

639

IS-IS Feature Guide for Routing Devices

Table 40: show route table Output Fields (continued)


Field Name

Field Description

route-destination
(entry, announced)

Route destination (for example:10.0.0.1/24). The entry value is the number of routes for this destination,
and the announced value is the number of routes being announced for this destination. Sometimes
the route destination is presented in another format, such as:

MPLS-label (for example, 80001).

interface-name (for example, ge-1/0/2).

neighbor-address:control-word-status:encapsulation type:vc-id:source (Layer 2 circuit only; for example,

10.1.1.195:NoCtrlWord:1:1:Local/96).

neighbor-addressAddress of the neighbor.

control-word-statusWhether the use of the control word has been negotiated for this virtual
circuit: NoCtrlWord or CtrlWord.

encapsulation typeType of encapsulation, represented by a number: (1) Frame Relay DLCI, (2)

ATM AAL5 VCC transport, (3) ATM transparent cell transport, (4) Ethernet, (5) VLAN Ethernet,
(6) HDLC, (7) PPP, (8) ATM VCC cell transport, (10) ATM VPC cell transport.

label stacking

vc-idVirtual circuit identifier.

sourceSource of the advertisement: Local or Remote.

(Next-to-the-last-hop routing device for MPLS only) Depth of the MPLS label stack, where the

label-popping operation is needed to remove one or more labels from the top of the stack. A pair of
routes is displayed, because the pop operation is performed only when the stack depth is two or more
labels.

S=0 route indicates that a packet with an incoming label stack depth of 2 or more exits this routing

device with one fewer label (the label-popping operation is performed).

[protocol, preference]

If there is no S= information, the route is a normal MPLS route, which has a stack depth of 1 (the
label-popping operation is not performed).

Protocol from which the route was learned and the preference value for the route.

+A plus sign indicates the active route, which is the route installed from the routing table into the

forwarding table.

- A hyphen indicates the last active route.

*An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.

In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In order to
use common comparison routines, Junos OS stores the 1's complement of the LocalPref value in the
Preference2 field. For example, if the LocalPref value for Route 1 is 100, the Preference2 value is -101.
If the LocalPref value for Route 2 is 155, the Preference2 value is -156. Route 2 is preferred because it
has a higher LocalPref value and a lower Preference2 value.
Level

(IS-IS only). In IS-IS, a single AS can be divided into smaller groups called areas. Routing between
areas is organized hierarchically, allowing a domain to be administratively divided into smaller areas.
This organization is accomplished by configuring Level 1 and Level 2 intermediate systems. Level 1
systems route within an area. When the destination is outside an area, they route toward a Level 2
system. Level 2 intermediate systems route between areas and toward other ASs.

Route Distinguisher

IP subnet augmented with a 64-bit prefix.

PMSI

Provider multicast service interface (MVPN routing table).

Next-hop type

Type of next hop. For a description of possible values for this field, see Table 32 on page 541.

640

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 40: show route table Output Fields (continued)


Field Name

Field Description

Next-hop reference
count

Number of references made to the next hop.

Flood nexthop branches


exceed maximum

Indicates that the number of flood next-hop branches exceeded the system limit of 32 branches, and
only a subset of the flood next-hop branches were installed in the kernel.

message
Source

IP address of the route source.

Next hop

Network layer address of the directly reachable neighboring system.

via

Interface used to reach the next hop. If there is more than one interface available to the next hop, the
name of the interface that is actually used is followed by the word Selected. This field can also contain
the following information:

WeightValue used to distinguish primary, secondary, and fast reroute backup routes. Weight
information is available when MPLS label-switched path (LSP) link protection, node-link protection,
or fast reroute is enabled, or when the standby state is enabled for secondary paths. A lower weight
value is preferred. Among routes with the same weight value, load balancing is possible.

BalanceBalance coefficient indicating how traffic of unequal cost is distributed among next hops
when a routing device is performing unequal-cost load balancing. This information is available
when you enable BGP multipath load balancing.

Label-switched-path
lsp-path-name

Name of the LSP used to reach the next hop.

Label operation

MPLS label and operation occurring at this routing device. The operation can be pop (where a label
is removed from the top of the stack), push (where another label is added to the label stack), or swap
(where a label is replaced by another label).

Interface

(Local only) Local interface name.

Protocol next hop

Network layer address of the remote routing device that advertised the prefix. This address is used
to derive a forwarding next hop.

Indirect next hop

Index designation used to specify the mapping between protocol next hops, tags, kernel export policy,
and the forwarding next hops.

State

State of the route (a route can be in more than one state). See Table 33 on page 543.

Local AS

AS number of the local routing device.

Age

How long the route has been known.

AIGP

Accumulated interior gateway protocol (AIGP) BGP attribute.

Metricn

Cost value of the indicated route. For routes within an AS, the cost is determined by IGP and the
individual protocol metrics. For external routes, destinations, or routing domains, the cost is determined
by a preference value.

Copyright 2015, Juniper Networks, Inc.

641

IS-IS Feature Guide for Routing Devices

Table 40: show route table Output Fields (continued)


Field Name

Field Description

MED-plus-IGP

Metric value for BGP path selection to which the IGP cost to the next-hop destination has been added.

TTL-Action

For MPLS LSPs, state of the TTL propagation attribute. Can be enabled or disabled for all
RSVP-signaled and LDP-signaled LSPs or for specific VRF routing instances.

Task

Name of the protocol that has added the route.

Announcement bits

The number of BGP peers or protocols to which Junos OS has announced this route, followed by the
list of the recipients of the announcement. Junos OS can also announce the route to the KRT for
installing the route into the Packet Forwarding Engine, to a resolve tree, a L2 VC, or even a VPN. For
example, n-Resolve inet indicates that the specified route is used for route resolution for next hops
found in the routing table.

AS path

nAn index used by Juniper Networks customer support only.

AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:

IIGP.

EEGP.

RecordedThe AS path is recorded by the sample process (sampled).

?Incomplete; typically, the AS path was aggregated.

When AS path numbers are included in the route, the format is as follows:

[ ]Brackets enclose the number that precedes the AS path. This number represents the number

of ASs present in the AS path, when calculated as defined in RFC 4271. This value is used in the
AS-path merge process, as defined in RFC 4893.

[ ]If more than one AS number is configured on the routing device, or if AS path prepending is

configured, brackets enclose the local AS number associated with the AS path.

{ }Braces enclose AS sets, which are groups of AS numbers in which the order does not matter.

A set commonly results from route aggregation. The numbers in each AS set are displayed in
ascending order.

( )Parentheses enclose a confederation.

( [ ] )Parentheses and brackets enclose a confederation set.

NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized attribute and
associated hexadecimal value if BGP receives attribute 128 (attribute set) and you have not configured
an independent domain in any routing instance.
validation-state

(BGP-learned routes) Validation status of the route:

InvalidIndicates that the prefix is found, but either the corresponding AS received from the EBGP

peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.

UnknownIndicates that the prefix is not among the prefixes or prefix ranges in the database.

UnverifiedIndicates that the origin of the prefix is not verified against the database. This is because

the database got populated and the validation is not called for in the BGP import policy, although
origin validation is enabled, or the origin validation is not enabled for the BGP peers.

642

ValidIndicates that the prefix and autonomous system pair are found in the database.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 40: show route table Output Fields (continued)


Field Name

Field Description

FECs bound to route

Point-to-multipoint root address, multicast source address, and multicast group address when
multipoint LDP (M-LDP) inband signaling is configured.

Primary Upstream

When multipoint LDP with multicast-only fast reroute (MoFRR) is configured, the primary upstream
path. MoFRR transmits a multicast join message from a receiver toward a source on a primary path,
while also transmitting a secondary multicast join message from the receiver toward the source on
a backup path.

RPF Nexthops

When multipoint LDP with MoFRR is configured, the reverse-path forwarding (RPF) next-hop
information. Data packets are received from both the primary path and the secondary paths. The
redundant packets are discarded at topology merge points due to the RPF checks.

Label

Multiple MPLS labels are used to control MoFRR stream selection. Each label represents a separate
route, but each references the same interface list check. Only the primary label is forwarded while all
others are dropped. Multiple interfaces can receive packets using the same label.

weight

Value used to distinguish MoFRR primary and backup routes. A lower weight value is preferred. Among
routes with the same weight value, load balancing is possible.

VC Label

MPLS label assigned to the Layer 2 circuit virtual connection.

MTU

Maximum transmission unit (MTU) of the Layer 2 circuit.

VLAN ID

VLAN identifier of the Layer 2 circuit.

Prefixes bound to route

Forwarding equivalent class (FEC) bound to this route. Applicable only to routes installed by LDP.

Communities

Community path attribute for the route. See Table 34 on page 545 for all possible values for this field.

Layer2-info: encaps

Layer 2 encapsulation (for example, VPLS).

control flags

Control flags: none or Site Down.

mtu

Maximum transmission unit (MTU) information.

Label-Base, range

First label in a block of labels and label block size. A remote PE routing device uses this first label
when sending traffic toward the advertising PE routing device.

status vector

Layer 2 VPN and VPLS network layer reachability information (NLRI).

Accepted Multipath

Current active path when BGP multipath is configured.

Accepted
LongLivedStale

The LongLivedStale flag indicates that the route was marked LLGR-stale by this router, as part of the
operation of LLGR receiver mode. Either this flag or the LongLivedStaleImport flag may be displayed
for a route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.

Copyright 2015, Juniper Networks, Inc.

643

IS-IS Feature Guide for Routing Devices

Table 40: show route table Output Fields (continued)


Field Name

Field Description

Accepted
LongLivedStaleImport

The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy. Either this flag or the LongLivedStale flag may be displayed for a
route. Neither of these flags are displayed at the same time as the Stale (ordinary GR stale) flag.
Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and import into the inet.0 routing table

ImportAccepted
LongLivedStaleImport

Accept all received BGP long-lived graceful restart (LLGR) and LLGR stale routes learned from
configured neighbors and imported into the inet.0 routing table
The LongLivedStaleImport flag indicates that the route was marked LLGR-stale when it was received
from a peer, or by import policy.

Accepted
MultipathContrib

Path currently contributing to BGP multipath.

Localpref

Local preference value included in the route.

Router ID

BGP router ID as advertised by the neighbor in the open message.

Primary Routing Table

In a routing table group, the name of the primary routing table in which the route resides.

Secondary Tables

In a routing table group, the name of one or more secondary tables in which the route resides.

Table 32 on page 541 describes all possible values for the Next-hop Types output field.

Table 41: Next-hop Types Output Field Values

644

Next-Hop Type

Description

Broadcast (bcast)

Broadcast next hop.

Deny

Deny next hop.

Discard

Discard next hop.

Flood

Flood next hop. Consists of components called branches,


up to a maximum of 32 branches. Each flood next-hop
branch sends a copy of the traffic to the forwarding
interface. Used by point-to-multipoint RSVP,
point-to-multipoint LDP, point-to-multipoint CCC, and
multicast.

Hold

Next hop is waiting to be resolved into a unicast or


multicast type.

Indexed (idxd)

Indexed next hop.

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 41: Next-hop Types Output Field Values (continued)


Next-Hop Type

Description

Indirect (indr)

Used with applications that have a protocol next hop


address that is remote. You are likely to see this next-hop
type for internal BGP (IBGP) routes when the BGP next
hop is a BGP neighbor that is not directly connected.

Interface

Used for a network address assigned to an interface. Unlike


the router next hop, the interface next hop does not
reference any specific node on the network.

Local (locl)

Local address on an interface. This next-hop type causes


packets with this destination address to be received locally.

Multicast (mcst)

Wire multicast next hop (limited to the LAN).

Multicast discard (mdsc)

Multicast discard.

Multicast group (mgrp)

Multicast group member.

Receive (recv)

Receive.

Reject (rjct)

Discard. An ICMP unreachable message was sent.

Resolve (rslv)

Resolving next hop.

Routed multicast (mcrt)

Regular multicast next hop.

Router

A specific node or set of nodes to which the routing device


forwards packets that match the route prefix.
To qualify as next-hop type router, the route must meet
the following criteria:

Must not be a direct or local subnet for the routing


device.

Must have a next hop that is directly connected to the


routing device.

Table

Routing table next hop.

Unicast (ucst)

Unicast.

Unilist (ulst)

List of unicast next hops. A packet sent to this next hop


goes to any next hop in the list.

Table 33 on page 543 describes all possible values for the State output field. A route can
be in more than one state (for example, <Active NoReadvrt Int Ext>).

Copyright 2015, Juniper Networks, Inc.

645

IS-IS Feature Guide for Routing Devices

Table 42: State Output Field Values

646

Value

Description

Accounting

Route needs accounting.

Active

Route is active.

Always Compare MED

Path with a lower multiple exit discriminator (MED) is


available.

AS path

Shorter AS path is available.

Cisco Non-deterministic MED


selection

Cisco nondeterministic MED is enabled, and a path with a


lower MED is available.

Clone

Route is a clone.

Cluster list length

Length of cluster list sent by the route reflector.

Delete

Route has been deleted.

Ex

Exterior route.

Ext

BGP route received from an external BGP neighbor.

FlashAll

Forces all protocols to be notified of a change to any route,


active or inactive, for a prefix. When not set, protocols are
informed of a prefix only when the active route changes.

Hidden

Route not used because of routing policy.

IfCheck

Route needs forwarding RPF check.

IGP metric

Path through next hop with lower IGP metric is available.

Inactive reason

Flags for this route, which was not selected as best for a
particular destination.

Initial

Route being added.

Int

Interior route.

Int Ext

BGP route received from an internal BGP peer or a BGP


confederation peer.

Interior > Exterior > Exterior via


Interior

Direct, static, IGP, or EBGP path is available.

Local Preference

Path with a higher local preference value is available.

Martian

Route is a martian (ignored because it is obviously invalid).

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 42: State Output Field Values (continued)


Value

Description

MartianOK

Route exempt from martian filtering.

Next hop address

Path with lower metric next hop is available.

No difference

Path from neighbor with lower IP address is available.

NoReadvrt

Route not to be advertised.

NotBest

Route not chosen because it does not have the lowest MED.

Not Best in its group

Incoming BGP AS is not the best of a group (only one AS can


be the best).

NotInstall

Route not to be installed in the forwarding table.

Number of gateways

Path with a greater number of next hops is available.

Origin

Path with a lower origin code is available.

Pending

Route pending because of a hold-down configured on another


route.

Release

Route scheduled for release.

RIB preference

Route from a higher-numbered routing table is available.

Route Distinguisher

64-bit prefix added to IP subnets to make them unique.

Route Metric or MED comparison

Route with a lower metric or MED is available.

Route Preference

Route with lower preference value is available

Router ID

Path through a neighbor with lower ID is available.

Secondary

Route not a primary route.

Unusable path

Path is not usable because of one of the following conditions:

Update source

The route is damped.

The route is rejected by an import policy.

The route is unresolved.

Last tiebreaker is the lowest IP address value.

Table 34 on page 545 describes the possible values for the Communities output field.

Copyright 2015, Juniper Networks, Inc.

647

IS-IS Feature Guide for Routing Devices

Table 43: Communities Output Field Values


Value

Description

area-number

4 bytes, encoding a 32-bit area number. For AS-external routes, the value is 0. A nonzero value
identifies the route as internal to the OSPF domain, and as within the identified area. Area
numbers are relative to a particular OSPF domain.

bandwidth: local AS
number:link-bandwidth-number

Link-bandwidth community value used for unequal-cost load balancing. When BGP has
several candidate paths available for multipath purposes, it does not perform unequal-cost
load balancing according to the link-bandwidth community unless all candidate paths have
this attribute.

domain-id

Unique configurable number that identifies the OSPF domain.

domain-id-vendor

Unique configurable number that further identifies the OSPF domain.

link-bandwidth-number

Link-bandwidth number: from 0 through 4,294,967,295 (bytes per second).

local AS number

Local AS number: from 1 through 65,535.

options

1 byte. Currently this is only used if the route type is 5 or 7. Setting the least significant bit in
the field indicates that the route carries a type 2 metric.

origin

(Used with VPNs) Identifies where the route came from.

ospf-route-type

1 byte, encoded as 1 or 2 for intra-area routes (depending on whether the route came from a
type 1 or a type 2 LSA); 3 for summary routes; 5 for external routes (area number must be0);
7 for NSSA routes; or 129 for sham link endpoint addresses.

route-type-vendor

Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x8000. The format is
area-number:ospf-route-type:options.

rte-type

Displays the area number, OSPF route type, and option of the route. This is configured using
the BGP extended community attribute 0x0306. The format is
area-number:ospf-route-type:options.

target

Defines which VPN the route participates in; target has the format 32-bit IP address:16-bit
number. For example, 10.19.0.0:100.

unknown IANA

Incoming IANA codes with a value between 0x1 and 0x7fff. This code of the BGP extended
community attribute is accepted, but it is not recognized.

unknown OSPF vendor


community

Incoming IANA codes with a value above 0x8000. This code of the BGP extended community
attribute is accepted, but it is not recognized.

Sample Output
show route table bgp.l2.vpn
user@host> show route table bgp.l2.vpn
bgp.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

648

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

192.168.24.1:1:4:1/96
*[BGP/170] 01:08:58, localpref 100, from 192.168.24.1
AS path: I
> to 10.0.16.2 via fe-0/0/1.0, label-switched-path am

show route table bgp.l3vpn.0


user@host> show route table bgp.l3vpn.0
bgp.l3vpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.255.71.15:100:10.255.71.17/32
*[BGP/170] 00:03:59, MED 1, localpref 100, from
10.255.71.15
AS path: I
> via so-2/1/0.0, Push 100020, Push 100011(top)
10.255.71.15:200:10.255.71.18/32
*[BGP/170] 00:03:59, MED 1, localpref 100, from
10.255.71.15
AS path: I
> via so-2/1/0.0, Push 100021, Push 100011(top)

show route table bgp.l3vpn.0 detail


user@host> show route table bgp.l3vpn.0 detail
bgp.l3vpn.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden)
10.255.245.12:1:4.0.0.0/8 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.245.12:1
Source: 10.255.245.12
Next hop: 192.168.208.66 via fe-0/0/0.0, selected
Label operation: Push 182449
Protocol next hop: 10.255.245.12
Push 182449
Indirect next hop: 863a630 297
State: <Active Int Ext>
Local AS:
35 Peer AS:
35
Age: 12:19
Metric2: 1
Task: BGP_35.10.255.245.12+179
Announcement bits (1): 0-BGP.0.0.0.0+179
AS path: 30 10458 14203 2914 3356 I (Atomic) Aggregator: 3356 4.68.0.11
Communities: 2914:420 target:11111:1 origin:56:78
VPN Label: 182449
Localpref: 100
Router ID: 10.255.245.12
10.255.245.12:1:4.17.225.0/24 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.245.12:1
Source: 10.255.245.12
Next hop: 192.168.208.66 via fe-0/0/0.0, selected
Label operation: Push 182465
Protocol next hop: 10.255.245.12
Push 182465
Indirect next hop: 863a8f0 305
State: <Active Int Ext>
Local AS:
35 Peer AS:
35
Age: 12:19
Metric2: 1

Copyright 2015, Juniper Networks, Inc.

649

IS-IS Feature Guide for Routing Devices

Task: BGP_35.10.255.245.12+179
Announcement bits (1): 0-BGP.0.0.0.0+179
AS path: 30 10458 14203 2914 11853 11853 11853 6496 6496 6496 6496 6496 6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
Router ID: 10.255.245.12
10.255.245.12:1:4.17.226.0/23 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.245.12:1
Source: 10.255.245.12
Next hop: 192.168.208.66 via fe-0/0/0.0, selected
Label operation: Push 182465
Protocol next hop: 10.255.245.12
Push 182465
Indirect next hop: 86bd210 330
State: <Active Int Ext>
Local AS:
35 Peer AS:
35
Age: 12:19
Metric2: 1
Task: BGP_35.10.255.245.12+179
Announcement bits (1): 0-BGP.0.0.0.0+179
AS path: 30 10458 14203 2914 11853 11853 11853 6496 6496 6496 6496 6496
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100
Router ID: 10.255.245.12
10.255.245.12:1:4.17.251.0/24 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.245.12:1
Source: 10.255.245.12
Next hop: 192.168.208.66 via fe-0/0/0.0, selected
Label operation: Push 182465
Protocol next hop: 10.255.245.12
Push 182465
Indirect next hop: 86bd210 330
State: <Active Int Ext>
Local AS:
35 Peer AS:
35
Age: 12:19
Metric2: 1
Task: BGP_35.10.255.245.12+179
Announcement bits (1): 0-BGP.0.0.0.0+179
AS path: 30 10458 14203 2914 11853 11853 11853 6496 6496 6496 6496 6496
6496 I
Communities: 2914:410 target:12:34 target:11111:1 origin:12:34
VPN Label: 182465
Localpref: 100

show route table bgp.rtarget.0 (When Proxy BGP Route Target Filtering Is Configured)
user@host> show route table bgp.rtarget.o
bgp.rtarget.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
100:100:100/96
*[RTarget/5] 00:03:14
Type Proxy
for 10.255.165.103

650

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

for 10.255.166.124
Local

show route table bgp.evpn.0


user@host> show route table bgp.evpn.0
bgp.evpn.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
2:100.100.100.2:100::0::00:26:88:5f:67:b0/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.1.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.2:100::0::00:51:51:51:51:51/304
*[BGP/170] 11:00:05, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.1.12.2 via xe-2/2/0.0, label-switched-path R0toR1
2:100.100.100.3:100::0::00:52:52:52:52:52/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.1.13.3 via ge-2/0/8.0, label-switched-path R0toR2
2:100.100.100.3:100::0::a8:d0:e5:5b:01:c8/304
*[BGP/170] 10:59:58, localpref 100, from 100.100.100.3
AS path: I, validation-state: unverified
> to 100.1.13.3 via ge-2/0/8.0, label-switched-path R0toR2
3:100.100.100.2:100::1000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.1.12.2 via xe-2/2/0.0, label-switched-path R0toR1
3:100.100.100.2:100::2000::100.100.100.2/304
*[BGP/170] 11:00:16, localpref 100, from 100.100.100.2
AS path: I, validation-state: unverified
> to 100.1.12.2 via xe-2/2/0.0, label-switched-path R0toR1

show route table inet.0


user@host> show route table inet.0
inet.0: 12 destinations, 12 routes (11 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0
1.0.0.1/32
1.0.0.2/32
12.12.12.21/32
13.13.13.13/32
13.13.13.14/32
13.13.13.21/32
13.13.13.22/32
127.0.0.1/32
111.222.5.0/24

Copyright 2015, Juniper Networks, Inc.

*[Static/5] 00:51:57
> to 111.222.5.254 via fxp0.0
*[Direct/0] 00:51:58
> via at-5/3/0.0
*[Local/0] 00:51:58
Local
*[Local/0] 00:51:57
Reject
*[Direct/0] 00:51:58
> via t3-5/2/1.0
*[Local/0] 00:51:58
Local
*[Local/0] 00:51:58
Local
*[Direct/0] 00:33:59
> via t3-5/2/0.0
[Direct/0] 00:51:58
> via lo0.0
*[Direct/0] 00:51:58
> via fxp0.0

651

IS-IS Feature Guide for Routing Devices

111.222.5.81/32

*[Local/0] 00:51:58
Local

show route table inet.3


user@host> show route table inet.3
inet.3: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
22.0.0.5/32

*[LDP/9] 00:25:43, metric 10, tag 200


to 1.2.94.2 via lt-1/2/0.49
> to 1.2.3.2 via lt-1/2/0.23

show route table inet6.0


user@host> show route table inet6.0
inet6.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Route, * = Both
fec0:0:0:3::/64 *[Direct/0] 00:01:34
>via fe-0/1/0.0
fec0:0:0:3::/128 *[Local/0] 00:01:34
>Local
fec0:0:0:4::/64 *[Static/5] 00:01:34
>to fec0:0:0:3::ffff via fe-0/1/0.0

show route table inet6.3


user@router> show route table inet6.3
inet6.3: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
::10.255.245.195/128
*[LDP/9] 00:00:22, metric 1
> via so-1/0/0.0
::10.255.245.196/128
*[LDP/9] 00:00:08, metric 1
> via so-1/0/0.0, Push 100008

show route table inetflow detail


user@host> show route table inetflow detail
inetflow.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
10.12.44.1,*/48 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Next-hop reference count: 2
State: <Active Ext>
Local AS: 65002 Peer AS: 65000
Age: 4
Task: BGP_65000.10.12.99.5+3792
Announcement bits (1): 0-Flow
AS path: 65000 I
Communities: traffic-rate:0:0
Validation state: Accept, Originator: 10.12.99.5
Via: 10.12.44.0/24, Active
Localpref: 100
Router ID: 10.255.71.161
10.12.56.1,*/48 (1 entry, 1 announced)
*Flow
Preference: 5

652

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Next-hop reference count: 2


State: <Active>
Local AS: 65002
Age: 6:30
Task: RT Flow
Announcement bits (2): 0-Flow 1-BGP.0.0.0.0+179
AS path: I
Communities: 1:1

show route table l2circuit.0


user@host> show route table l2circuit.0
l2circuit.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.1.1.195:NoCtrlWord:1:1:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push
via so-0/1/3.0, Push
10.1.1.195:NoCtrlWord:1:1:Remote/96
*[LDP/9] 00:50:14
Discard
10.1.1.195:CtrlWord:1:2:Local/96
*[L2CKT/7] 00:50:47
> via so-0/1/2.0, Push
via so-0/1/3.0, Push
10.1.1.195:CtrlWord:1:2:Remote/96
*[LDP/9] 00:50:14
Discard

100049
100049

100049
100049

show route table mpls


user@host> show route table mpls
mpls.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0
1
2
1024

*[MPLS/0] 00:13:55, metric 1


Receive
*[MPLS/0] 00:13:55, metric 1
Receive
*[MPLS/0] 00:13:55, metric 1
Receive
*[VPN/0] 00:04:18
to table red.inet.0, Pop

show route table mpls extensive


user@host> show route table mpls extensive
100000 (1 entry, 1 announced)
TSI:
KRT in-kernel 100000 /36 -> {so-1/0/0.0}
*LDP
Preference:
9
Next hop: via so-1/0/0.0, selected
Pop
State: <Active Int>
Age: 29:50
Metric: 1
Task: LDP
Announcement bits (1): 0-KRT
AS path: I
Prefixes bound to route: 10.0.0.194/32

Copyright 2015, Juniper Networks, Inc.

653

IS-IS Feature Guide for Routing Devices

show route table mpls.0


user@host> show route table mpls.0
mpls.0: 11 destinations, 11 routes (11 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0
1
2
100000
100001
100002

100002(S=0)

100003

100004

so-0/1/0.1

so-0/1/0.2

*[MPLS/0] 00:45:09, metric 1


Receive
*[MPLS/0] 00:45:09, metric 1
Receive
*[MPLS/0] 00:45:09, metric 1
Receive
*[L2VPN/7] 00:43:04
> via so-0/1/0.1, Pop
*[L2VPN/7] 00:43:03
> via so-0/1/0.2, Pop
Offset:
*[LDP/9] 00:43:22, metric 1
via so-0/1/2.0, Pop
> via so-0/1/3.0, Pop
*[LDP/9] 00:43:22, metric 1
via so-0/1/2.0, Pop
> via so-0/1/3.0, Pop
*[LDP/9] 00:43:22, metric 1
> via so-0/1/2.0, Swap 100002
via so-0/1/3.0, Swap 100002
*[LDP/9] 00:43:16, metric 1
via so-0/1/2.0, Swap 100049
> via so-0/1/3.0, Swap 100049
*[L2VPN/7] 00:43:04
> via so-0/1/2.0, Push 100001, Push
via so-0/1/3.0, Push 100001, Push
*[L2VPN/7] 00:43:03
via so-0/1/2.0, Push 100000, Push
> via so-0/1/3.0, Push 100000, Push

100049(top)
100049(top)
100049(top) Offset: -4
100049(top) Offset: -4

show route table mpls.0 detail (PTX Series)


user@host> show route table mpls.0 detail
ge-0/0/2.600 (1 entry, 1 announced)
*L2VPN Preference: 7
Next hop type: Indirect
Address: 0x9438f34
Next-hop reference count: 2
Next hop type: Router, Next hop index: 567
Next hop: 3.0.0.1 via ge-0/0/1.0, selected
Label operation: Push 299808
Label TTL action: prop-ttl
Load balance label: Label 299808:None;
Session Id: 0x1
Protocol next hop: 10.255.255.1
Label operation: Push 299872 Offset: 252
Label TTL action: no-prop-ttl
Load balance label: Label 299872:Flow label PUSH;
Composite next hop: 0x9438ed8 570 INH Session ID: 0x2
Indirect next hop: 0x9448208 262142 INH Session ID: 0x2
State: <Active Int>
Age: 21
Metric2: 1
Validation State: unverified
Task: Common L2 VC
Announcement bits (2): 0-KRT 2-Common L2 VC
AS path: I

654

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route table mpls.0 extensive (PTX Series)


user@host> show route table mpls.0 extensive
ge-0/0/2.600 (1 entry, 1 announced)
TSI:
KRT in-kernel ge-0/0/2.600.0
/32 -> {composite(570)}
*L2VPN Preference: 7
Next hop type: Indirect
Address: 0x9438f34
Next-hop reference count: 2
Next hop type: Router, Next hop index: 567
Next hop: 3.0.0.1 via ge-0/0/1.0, selected
Label operation: Push 299808
Label TTL action: prop-ttl
Load balance label: Label 299808:None;
Session Id: 0x1
Protocol next hop: 10.255.255.1
Label operation: Push 299872 Offset: 252
Label TTL action: no-prop-ttl
Load balance label: Label 299872:Flow label PUSH;
Composite next hop: 0x9438ed8 570 INH Session ID: 0x2
Indirect next hop: 0x9448208 262142 INH Session ID: 0x2
State: <Active Int>
Age: 47
Metric2: 1
Validation State: unverified
Task: Common L2 VC
Announcement bits (2): 0-KRT 2-Common L2 VC
AS path: I
Composite next hops: 1
Protocol next hop: 10.255.255.1 Metric: 1
Label operation: Push 299872 Offset: 252
Label TTL action: no-prop-ttl
Load balance label: Label 299872:Flow label PUSH;
Composite next hop: 0x9438ed8 570 INH Session ID: 0x2
Indirect next hop: 0x9448208 262142 INH Session ID: 0x2
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 3.0.0.1 via ge-0/0/1.0
Session Id: 0x1
10.255.255.1/32 Originating RIB: inet.3
Metric: 1
Node path count: 1
Forwarding nexthops: 1
Nexthop: 3.0.0.1 via ge-0/0/1.0

show route table mpls.0 (RSVP RouteTransit LSP)


In the sample output, the 1 in [RSVP/7/1] indicates the secondary preference value. The
secondary preference value becomes significant when multiple RSVP LSPs of different
types are signaled to the destination. The possible values of RSVP secondary preferences
are:
1Normal Point-to-Point RSVP-TE LSP
2Point-to-Multipoint (P2MP) RSVP-TE LSP
3Dynamic RSVP-TE LSP
user@host> show route table mpls.0
mpls.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden)

Copyright 2015, Juniper Networks, Inc.

655

IS-IS Feature Guide for Routing Devices

+ = Active Route, - = Last Active, * = Both


0
1
2
13
300352
300352(S=0)
300384
300384(S=0)

*[MPLS/0] 00:37:31, metric 1


Receive
*[MPLS/0] 00:37:31, metric 1
Receive
*[MPLS/0] 00:37:31, metric 1
Receive
*[MPLS/0] 00:37:31, metric 1
Receive
*[RSVP/7/1] 00:08:00, metric 1
> to 8.64.0.106 via ge-1/0/1.0,
*[RSVP/7/1] 00:08:00, metric 1
> to 8.64.0.106 via ge-1/0/1.0,
*[RSVP/7/2] 00:05:20, metric 1
> to 8.64.1.106 via ge-1/0/0.0,
*[RSVP/7/2] 00:05:20, metric 1
> to 8.64.1.106 via ge-1/0/0.0,

label-switched-path lsp1_p2p
label-switched-path lsp1_p2p
Pop
Pop

show route table vpls_1 detail


user@host> show route table vpls_1 detail
vpls_1.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
1.1.1.11:1000:1:1/96 (1 entry, 1 announced)
*L2VPN Preference: 170/-1
Receive table: vpls_1.l2vpn.0
Next-hop reference count: 2
State: <Active Int Ext>
Age: 4:29:47 Metric2: 1
Task: vpls_1-l2vpn
Announcement bits (1): 1-BGP.0.0.0.0+179
AS path: I
Communities: Layer2-info: encaps:VPLS, control flags:Site-Down
Label-base: 800000, range: 8, status-vector: 0xFF

show route table vpn-a


user@host> show route table vpn-a
vpn-a.l2vpn.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
192.168.16.1:1:1:1/96
*[VPN/7] 05:48:27
Discard
192.168.24.1:1:2:1/96
*[BGP/170] 00:02:53, localpref 100, from 192.168.24.1
AS path: I
> to 10.0.16.2 via fe-0/0/1.0, label-switched-path am
192.168.24.1:1:3:1/96
*[BGP/170] 00:02:53, localpref 100, from 192.168.24.1
AS path: I
> to 10.0.16.2 via fe-0/0/1.0, label-switched-path am

show route table vpn-a.mdt.0


user@host> show route table vpn-a.mdt.0
vpn-a.mdt.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1:1:0:10.255.14.216:232.1.1.1/144

656

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

*[MVPN/70] 01:23:05, metric2 1


Indirect
1:1:1:10.255.14.218:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.218
AS path: I
> via so-0/0/0.0, label-switched-path r0e-to-r1
1:1:2:10.255.14.217:232.1.1.1/144
*[BGP/170] 00:57:49, localpref 100, from 10.255.14.217
AS path: I
> via so-0/0/1.0, label-switched-path r0-to-r2

show route table VPN-A detail


user@host> show route table VPN-A detail
VPN-AB.inet.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden)
10.255.179.9/32 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Route Distinguisher: 10.255.179.13:200
Next hop type: Indirect
Next-hop reference count: 5
Source: 10.255.179.13
Next hop type: Router, Next hop index: 732
Next hop: 10.39.1.14 via fe-0/3/0.0, selected
Label operation: Push 299824, Push 299824(top)
Protocol next hop: 10.255.179.13
Push 299824
Indirect next hop: 8f275a0 1048574
State: (Secondary Active Int Ext)
Local AS: 1 Peer AS: 1
Age: 3:41:06 Metric: 1 Metric2: 1
Task: BGP_1.10.255.179.13+64309
Announcement bits (2): 0-KRT 1-BGP RT Background
AS path: I
Communities: target:1:200 rte-type:0.0.0.0:1:0
Import Accepted
VPN Label: 299824 TTL Action: vrf-ttl-propagate
Localpref: 100
Router ID: 10.255.179.13
Primary Routing Table bgp.l3vpn.0

show route table VPN-AB.inet.0


user@host> show route table VPN-AB.inet.0
VPN-AB.inet.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
10.39.1.0/30
10.39.1.4/30
10.39.1.6/32
10.255.71.16/32
10.255.71.17/32
10.255.71.15

10.255.71.18/32
10.255.71.15

*[OSPF/10] 00:07:24, metric 1


> via so-7/3/1.0
*[Direct/0] 00:08:42
> via so-5/1/0.0
*[Local/0] 00:08:46
Local
*[Static/5] 00:07:24
> via so-2/0/0.0
*[BGP/170] 00:07:24, MED 1, localpref 100, from
AS path: I
> via so-2/1/0.0, Push 100020, Push 100011(top)
*[BGP/170] 00:07:24, MED 1, localpref 100, from
AS path: I

Copyright 2015, Juniper Networks, Inc.

657

IS-IS Feature Guide for Routing Devices

10.255.245.245/32

10.255.245.246/32

> via so-2/1/0.0, Push 100021, Push 100011(top)


*[BGP/170] 00:08:35, localpref 100
AS path: 2 I
> to 10.39.1.5 via so-5/1/0.0
*[OSPF/10] 00:07:24, metric 1
> via so-7/3/1.0

show route table VPN_blue.mvpn-inet6.0


user@host> show route table VPN_blue.mvpn-inet6.0
vpn_blue.mvpn-inet6.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1:10.255.2.202:65535:10.255.2.202/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
1:10.255.2.203:65535:10.255.2.203/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.203
AS path: I
> via so-0/1/0.0
1:10.255.2.204:65535:10.255.2.204/432
*[MVPN/70] 00:57:23, metric2 1
Indirect
5:10.255.2.202:65535:128:::192.168.90.2:128:ffff::1/432
*[BGP/170] 00:02:37, localpref 100, from 10.255.2.202
AS path: I
> via so-0/1/3.0
6:10.255.2.203:65535:65000:128:::10.12.53.12:128:ffff::1/432
*[PIM/105] 00:02:37
Multicast (IPv6)
7:10.255.2.202:65535:65000:128:::192.168.90.2:128:ffff::1/432
*[MVPN/70] 00:02:37, metric2 1
Indirect

show route table vrf1.mvpn.0 extensive


user@host> show route table vrf1.mvpn.0 extensive
1:10.255.50.77:1:10.255.50.77/240 (1 entry, 1 announced)
*MVPN
Preference: 70
PMSI: Flags 0x0: Label 0: RSVP-TE:
Session_13[10.255.50.77:0:25624:10.255.50.77]
Next hop type: Indirect
Address: 0xbb2c944
Next-hop reference count: 360
Protocol next hop: 10.255.50.77
Indirect next hop: 0x0 - INH Session ID: 0x0
State: <Active Int Ext>
Age: 53:03
Metric2: 1
Validation State: unverified
Task: mvpn global task
Announcement bits (3): 0-PIM.vrf1 1-mvpn global task 2-rt-export
AS path: I

show route table MVPN.mvpn.0


Starting in Junos OS Release 15.1, multicast routes on the locally originated type 7 customer
multicast routes are added exclusively by PIM. The functionality of the BGP-MVPN service
(which, internally, depends on contributions of state from both the MVPN and PIM protocol
components of Junos OS) remains unchanged. MVPN, however, no longer appears as

658

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

the originator of the locally advertised route. Routes advertised by remote PEs are, as
usual, always learned locally from their respective [BGP/...] protocol.
user@host> show route table MVPN.mvpn.0
MVPN.mvpn.0: 3 destinations, 3 routes (3 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
7:10.255.2.202:65535:65000:128:::192.168.90.2:128:ffff::1/432
*[PIM/70] 00:02:37, metric2 1
Indirect
5:100:32:192.168.1.9:32:239.1.1.1/240
*[PIM/105] 01:51:21
Multicast (IPv4)
7:100:1:100.32.192.168.5:32:237.1.1.1/240
*[PIM/105] 01:51:21
Multicast (IPv4)

show route table inetflow detail


user@host> show route table inetflow detail
inetflow.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
10.12.44.1,*/48 (1 entry, 1 announced)
*BGP
Preference: 170/-101
Next-hop reference count: 2
State: <Active Ext>
Local AS: 65002 Peer AS: 65000
Age: 4
Task: BGP_65000.10.12.99.5+3792
Announcement bits (1): 0-Flow
AS path: 65000 I
Communities: traffic-rate:0:0
Validation state: Accept, Originator: 10.12.99.5
Via: 10.12.44.0/24, Active
Localpref: 100
Router ID: 10.255.71.161
10.12.56.1,*/48 (1 entry, 1 announced)
*Flow
Preference: 5
Next-hop reference count: 2
State: <Active>
Local AS: 65002
Age: 6:30
Task: RT Flow
Announcement bits (2): 0-Flow 1-BGP.0.0.0.0+179
AS path: I
Communities: 1:1
user@PE1> show route table green.l2vpn.0 (VPLS Multihoming with FEC 129)
green.l2vpn.0: 6 destinations, 6 routes (6 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1.1.1.2:100:1.1.1.2/96 AD
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect
1.1.1.4:100:1.1.1.4/96 AD
*[BGP/170] 1d 03:11:02, localpref 100, from 1.1.1.4
AS path: I, validation-state: unverified
>
via ge-1/2/1.5
1.1.1.2:100:1:0/96 MH
*[VPLS/170] 1d 03:11:03, metric2 1
Indirect

Copyright 2015, Juniper Networks, Inc.

659

IS-IS Feature Guide for Routing Devices

1.1.1.4:100:1:0/96 MH
*[BGP/170] 1d 03:11:02, localpref 100, from 1.1.1.4
AS path: I, validation-state: unverified
>
via ge-1/2/1.5
1.1.1.4:NoCtrlWord:5:100:100:1.1.1.2:1.1.1.4/176
*[VPLS/7] 1d 03:11:02, metric2 1
>
via ge-1/2/1.5
1.1.1.4:NoCtrlWord:5:100:100:1.1.1.4:1.1.1.2/176
*[LDP/9] 1d 03:11:02
Discard
user@host> show route table red extensive
red.inet.0: 364481 destinations, 714087 routes (364480 active, 48448 holddown, 1
hidden)
22.0.0.0/32 (3 entries, 1 announced)
State: <OnList CalcForwarding>
TSI:
KRT in-kernel 22.0.0.0/32 -> {composite(1048575)} Page 0 idx 1 Type 1 val 0x934342c
Nexthop: Self
AS path: [2] I
Communities: target:2:1
Path 22.0.0.0 from 2.3.0.0 Vector len 4. Val: 1
@BGP
Preference: 170/-1
Route Distinguisher: 2:1
Next hop type: Indirect
Address: 0x258059e4
Next-hop reference count: 2
Source: 2.2.0.0
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0, selected
Label operation: Push 707633
Label TTL action: prop-ttl
Session Id: 0x17d8
Protocol next hop: 2.2.0.0
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c
State: <Secondary Active Int Ext ProtectionPath ProtectionCand>
Local AS:
2 Peer AS:
2
Age: 23
Metric2: 35
Validation State: unverified
Task: BGP_2.2.2.0.0+34549
AS path: I
Communities: target:2:1
Import Accepted
VPN Label: 16
Localpref: 0
Router ID: 2.2.0.0
Primary Routing Table bgp.l3vpn.0
Composite next hops: 1
Protocol next hop: 2.2.0.0 Metric: 35
Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0
Session Id: 0x17d8
2.2.0.0/32 Originating RIB: inet.3
Metric: 35
Node path count: 1

660

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

BGP

Forwarding nexthops: 1
Nexthop: 10.1.1.1 via ge-1/1/9.0
Preference: 170/-1
Route Distinguisher: 2:1
Next hop type: Indirect
Address: 0x9347028
Next-hop reference count: 3
Source: 2.3.0.0
Next hop type: Router, Next hop index: 702
Next hop: 10.1.4.2 via ge-1/0/0.0, selected
Label operation: Push 634278
Label TTL action: prop-ttl
Session Id: 0x17d9
Protocol next hop: 2.3.0.0
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID: 0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID: 0x17da
State: <Secondary NotBest Int Ext ProtectionPath ProtectionCand>
Inactive reason: Not Best in its group - IGP metric
Local AS:
2 Peer AS:
2
Age: 3:34
Metric2: 70
Validation State: unverified
Task: BGP_2.2.3.0.0+32805
Announcement bits (2): 0-KRT 1-BGP_RT_Background
AS path: I
Communities: target:2:1
Import Accepted
VPN Label: 16
Localpref: 0
Router ID: 2.3.0.0
Primary Routing Table bgp.l3vpn.0
Composite next hops: 1
Protocol next hop: 2.3.0.0 Metric: 70
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID:

0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID:
0x17da
Indirect path forwarding next hops: 1
Next hop type: Router
Next hop: 10.1.4.2 via ge-1/0/0.0
Session Id: 0x17d9
2.3.0.0/32 Originating RIB: inet.3
Metric: 70
Node path count: 1
Forwarding nexthops: 1
Nexthop: 10.1.4.2 via ge-1/0/0.0
#Multipath Preference: 255
Next hop type: Indirect
Address: 0x24afca30
Next-hop reference count: 1
Next hop type: Router
Next hop: 10.1.1.1 via ge-1/1/9.0, selected
Label operation: Push 707633
Label TTL action: prop-ttl
Session Id: 0x17d8
Next hop type: Router, Next hop index: 702
Next hop: 10.1.4.2 via ge-1/0/0.0
Label operation: Push 634278
Label TTL action: prop-ttl
Session Id: 0x17d9

Copyright 2015, Juniper Networks, Inc.

661

IS-IS Feature Guide for Routing Devices

Protocol next hop: 2.2.0.0


Push 16
Composite next hop: 0x25805988 - INH Session ID: 0x193c
Indirect next hop: 0x23eea900 - INH Session ID: 0x193c Weight 0x1
Protocol next hop: 2.3.0.0
Push 16
Composite next hop: 0x93463a0 1048575 INH Session ID: 0x17da
Indirect next hop: 0x91e8800 1048574 INH Session ID: 0x17da Weight
0x4000
State: <ForwardingOnly Int Ext>
Inactive reason: Forwarding use only
Age: 23
Metric2: 35
Validation State: unverified
Task: RT
AS path: I
Communities: target:2:1

662

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

show route terse


List of Syntax

Syntax on page 663


Syntax (EX Series Switches) on page 663

Syntax

show route terse


<logical-system (all | logical-system-name)>

Syntax (EX Series


Switches)

show route terse

Release Information

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.

Description

Display a high-level summary of the routes in the routing table.

NOTE: For BGP routes, the show route terse command displays the local
preference attribute and MED instead of the metric1 and metric2 values. This
is mostly due to historical reasons.
To display the metric1 and metric2 value of a BGP route, use the show route
extensive command.

Options

noneDisplay a high-level summary of the routes in the routing table.


logical-system (all | logical-system-name)(Optional) Perform this operation on all logical

systems or on a particular logical system.


Required Privilege
Level

view

List of Sample Output

show route terse on page 665

Output Fields

Table 44 on page 663 describes the output fields for the show route terse command.
Output fields are listed in the approximate order in which they appear.

Table 44: show route terse Output Fields


Field Name

Field Description

routing-table-name

Name of the routing table (for example, inet.0).

number destinations

Number of destinations for which there are routes in the routing table.

number routes

Number of routes in the routing table and total number of routes in the following states:

active (routes that are active)

holddown (routes that are in the pending state before being declared inactive)

hidden (routes that are not used because of a routing policy)

Copyright 2015, Juniper Networks, Inc.

663

IS-IS Feature Guide for Routing Devices

Table 44: show route terse Output Fields (continued)


Field Name

Field Description

route key

Key for the state of the route:

+A plus sign indicates the active route, which is the route installed from the routing table into the

forwarding table.

- A hyphen indicates the last active route.

*An asterisk indicates that the route is both the active and the last active route. An asterisk before
a to line indicates the best subpath to the route.

Active route. An asterisk (*) indicates this is the active route.

Validation status of the route:

?Not evaluated. Indicates that the route was not learned through BGP.

IInvalid. Indicates that the prefix is found, but either the corresponding AS received from the EBGP

peer is not the AS that appears in the database, or the prefix length in the BGP update message is
longer than the maximum length permitted in the database.

NUnknown. Indicates that the prefix is not among the prefixes or prefix ranges in the database.

VValid. Indicates that the prefix and autonomous system pair are found in the database.

Destination

Destination of the route.

Protocol through which the route was learned:

AAggregate

BBGP

CCCC

DDirect

GGMPLS

IIS-IS

LL2CKT, L2VPN, LDP, Local

KKernel

MMPLS, MSDP

OOSPF

PPIM

RRIP, RIPng

SStatic

TTunnel

Prf

Preference value of the route. In every routing metric except for the BGP LocalPref attribute, a lesser
value is preferred. In order to use common comparison routines, Junos OS stores the 1's complement
of the LocalPref value in the Preference2 field. For example, if the LocalPref value for Route 1 is 100,
the Preference2 value is -101. If the LocalPref value for Route 2 is 155, the Preference2 value is -156.
Route 2 is preferred because it has a higher LocalPref value and a lower Preference2 value.

Metric 1

First metric value in the route. For routes learned from BGP, this is the MED metric.

Metric 2

Second metric value in the route. For routes learned from BGP, this is the IGP metric.

664

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 44: show route terse Output Fields (continued)


Field Name

Field Description

Next hop

Next hop to the destination. An angle bracket (>) indicates that the route is the selected route.

AS path

AS path through which the route was learned. The letters at the end of the AS path indicate the path
origin, providing an indication of the state of the route at the point at which the AS path originated:

IIGP.

EEGP.

?Incomplete; typically, the AS path was aggregated.

Sample Output
show route terse
user@host> show route terse
inet.0: 10 destinations, 12 routes (10 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
A V Destination
* ? 1.0.1.1/32
?
unverified
* ? 1.1.1.1/32
* V 2.2.0.2/32
valid
* ? 10.0.0.0/30
?
unverified
* ? 10.0.0.1/32
* ? 10.0.0.4/30
unverified
* ? 10.0.0.8/30
unverified
* I 172.16.1.1/32
invalid
* N 192.168.2.3/32
unknown
* ? 224.0.0.5/32

Copyright 2015, Juniper Networks, Inc.

P Prf
O 10
B 170
D
0
B 170
D
0
B 170
L
0
B 170

Metric 1
1
100

Metric 2

Next hop
>10.0.0.2

AS path
I

>10.0.0.2
>lo0.2
110

200 I
>10.0.0.2
>lt-1/2/0.1

100

I
>10.0.0.2
Local

100

I
>10.0.0.2

B 170

100

I
>10.0.0.2

B 170

90

200 I
>10.0.0.2

B 170
O

10

100
1

200 I
>10.0.0.2
MultiRecv

665

IS-IS Feature Guide for Routing Devices

show security keychain


Syntax

Release Information

Description

Options

show security keychain


<brief | detail>

Command introduced in Junos OS Release 11.2.


Statement introduced in Junos OS Release 12.3X50 for the QFX Series.
Display information about authentication keychains configured for the Border Gateway
Protocol (BGP), the Label Distribution Protocol (LDP) routing protocols, the Bidirectional
Forwarding Detection (BFD) protocol, and the Intermediate System-to-Intermediate
System (IS-IS) protocol.
noneDisplay information about authentication keychains.
brief | detail(Optional) Display the specified level of output.

Required Privilege
Level
List of Sample Output

Output Fields

view

show security keychain brief on page 668


show security keychain detail on page 668
Table 14 on page 457 describes the output fields for the show security keychain command.
Output fields are listed in the approximate order in which they appear.

Table 45: show security keychain Output Fields

666

Field Name

Field Description

Level of
Output

keychain

The name of the keychain in operation.

All levels

Active-ID Send

Number of routing protocols packets sent


with the active key.

All levels

Active-ID Receive

Number of routing protocols packets received


with the active key.

All levels

Next-ID Send

Number of routing protocols packets sent


with the next key.

All levels

Next-ID Receive

Number of routing protocols packets received


with the next key.

All levels

Transition

Amount of time until the current key will be


replaced with the next key in the keychain.

All levels

Tolerance

Configured clock-skew tolerance, in seconds,


for accepting keys for a key chain.

All levels

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

Table 45: show security keychain Output Fields (continued)


Level of
Output

Field Name

Field Description

Id

Identification number configured for the


current key.

detail

Algorithm

Authentication algorithm configured for the


current key.

detail

State

State of the current key.

detail

The value can be:

receive

send

send-receive

For the active key, the State can be


send-receive, send, or receive. For keys that
have a future start time, the State is inactive.
Compare the State field to the Mode field.
Option

For IS-IS only, the option determines how


Junos OS encodes the message
authentication code in routing protocol
packets.

detail

The values can be:

basicBased on RFC 5304.

isis-enhancedBased on RFC 5310.

The default value is basic. When you


configure the isis-enhanced option, Junos OS
sends RFC 5310-encoded routing protocol
packets and accepts both RFC
5304-encoded and RFC 5310-encoded
routing protocol packets that are received
from other devices.
When you configure basic (or do not include
the options statement in the key
configuration) Junos OS sends and receives
RFC 5304-encoded routing protocols
packets, and drops 5310-encoded routing
protocol packets that are received from other
devices.
Because this setting is for IS-IS only, the TCP
and the BFD protocol ignore the encoding
option configured in the key.
Start-time

Copyright 2015, Juniper Networks, Inc.

Time that the current key became active.

detail

667

IS-IS Feature Guide for Routing Devices

Table 45: show security keychain Output Fields (continued)


Field Name

Field Description

Level of
Output

Mode

Mode of each key (Informational only.)

detail

The value can be

receive

send

send-receive

The mode of the key is based on the


configuration. Suppose you configure two
keys, one with a start-time of today and the
other with a start-time of next week. For both
keys, the Mode can be send-receive, send, or
receive, regardless of the configured
start-time. Compare the Mode field to the
State field.

Sample Output
show security keychain brief
user@host> show security keychain brief
keychain
Active-ID
Send Receive
hakr
3
3

Next-ID
Send Receive
1
1

Transition

Tolerance

1d 23:58

3600

show security keychain detail


user@host> show security keychain detail
keychain
Active-ID
Next-ID
Transition
Send Receive
Send Receive
hakr
3
3
1
1
1d 23:58
Id 3, Algorithm hmac-md5, State send-receive, Option basic
Start-time Wed Aug 11 16:28:00 2010, Mode send-receive
Id 1, Algorithm hmac-md5, State inactive, Option basic
Start-time Fri Aug 20 11:30:57 2010, Mode send-receive

668

Tolerance
3600

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

test policy
Syntax
Release Information

Description

test policy policy-name prefix

Command introduced before Junos OS Release 7.4.


Command introduced in Junos OS Release 9.0 for EX Series switches.
Test a policy configuration to determine which prefixes match routes in the routing table.

NOTE: If you are using the test policy command on a logical system, you must
first set the CLI to the logical system context. For example, if you want to test
a routing policy that is configured on logical system R2, first run the set cli
logical-system R2 command.

Options

policy-nameName of a policy.
prefixDestination prefix to match.

Additional Information

Required Privilege
Level
Related
Documentation

List of Sample Output


Output Fields

All prefixes in the default unicast routing table (inet.0) that match prefixes that are the
same as or longer than the specific prefix are processed by the from clause in the specified
policy. All prefixes accepted by the policy are displayed. The test policy command
evaluates a policy differently from the BGP import process. When testing a policy that
contains an interface match condition in the from clause, the test policy command uses
the match condition. In contrast, BGP does not use the interface match condition when
evaluating the policy against routes learned from internal BGP (IBGP) or external BGP
(EGBP) multihop peers.
view

Understanding Routing Policy Tests

Example: Testing a Routing Policy with Complex Regular Expressions

test policy on page 669


For information about output fields, see the output field tables for the show route
command, the show route detail command, the show route extensive command, or
the show route terse command.

Sample Output
test policy
user@host> test policy test-statics 3.0.0.1/8
inet.0: 44 destinations, 44 routes (44 active, 0 holddown, 0 hidden)
Prefixes passing policy:

Copyright 2015, Juniper Networks, Inc.

669

IS-IS Feature Guide for Routing Devices

3.0.0.0/8

*[BGP/170] 16:22:46, localpref 100, from 10.255.255.41


AS Path: 50888 I
> to 10.11.4.32 via en0.2, label-switched-path l2
3.3.3.1/32
*[IS-IS/18] 2d 00:21:46, metric 0, tag 2
> to 10.0.4.7 via fxp0.0
3.3.3.2/32
*[IS-IS/18] 2d 00:21:46, metric 0, tag 2
> to 10.0.4.7 via fxp0.0
3.3.3.3/32
*[IS-IS/18] 2d 00:21:46, metric 0, tag 2
> to 10.0.4.7 via fxp0.0
3.3.3.4/32
*[IS-IS/18] 2d 00:21:46, metric 0, tag 2
> to 10.0.4.7 via fxp0.0
Policy test-statics: 5 prefixes accepted, 0 prefixes rejected

670

Copyright 2015, Juniper Networks, Inc.

Chapter 17: Operational Commands

traceroute clns
Syntax

Release Information
Description
Options

traceroute clns <host>


routing-instance <name>
source <source-address>
ttl <value>
wait <seconds>

Command introduced in Junos OS Release 8.0


Trace the route belonging to Connectionless Network Service (CLNS).
hostIP address or name of remote host.
routing-instance nameName of the routing instance for a traceroute attempt.
source source addressSource address to be used in outgoing packets.
ttl valueCLNP maximum time-to-live value. The range of values is 1 through 255.
wait secondsNumber of seconds to wait for a response. The range of values is 1 second

through 1 day.
Required Privilege
Level
List of Sample Output
Output Fields

network

traceroute clns on page 671


Table 46 on page 671 describes the output fields for the traceroute clns command. Output
fields are listed in the approximate order in which they appear.

Table 46: Traceroute clns Output Fields


Field Name

Field Description

source

Source address used in outgoing packets.

traceroute to

IP address of the receiver.

hops max

Maximum number of hops allowed.

byte packets

Size of packets being sent.

Sample Output
traceroute clns
user@host>traceroute clns <ISO address of the destination> source <ISO address of the source>
traceroute clns 49.0005.80ff.f800.0000.0108.0001.0102.5522.4145.00 source
47.0005.80ff.f800.0000.0108.0001.0102.5522.4143.00
clnstraceroute to 49.0005.80ff.f800.0000.0108.0001.0102.5522.4145.00 from
47.0005.80ff.f800.0000.0108.0001.0102.5522.4143.00, 30 hops max, 17 byte packets

Copyright 2015, Juniper Networks, Inc.

671

IS-IS Feature Guide for Routing Devices

1
ms
2
3
4
5
ms

672

47.0005.80ff.f800.0000.0108.0001.0010.0010.0010.00

7.080 ms

5.579 ms

5.882

* * *
* * *
* * *
49.0005.80ff.f800.0000.0108.0001.0102.5522.4145.00

11.325 ms

7.704 ms

5.261

Copyright 2015, Juniper Networks, Inc.

PART 5

Index

Index on page 675

Copyright 2015, Juniper Networks, Inc.

673

IS-IS Feature Guide for Routing Devices

674

Copyright 2015, Juniper Networks, Inc.

BFD

Index
Symbols
#, comments in configuration statements.................xviii
( ), in syntax descriptions..................................................xviii
< >, in syntax descriptions.................................................xviii
[ ], in configuration statements.......................................xviii
{ }, in configuration statements......................................xviii
| (pipe), in syntax descriptions........................................xviii

A
adjacencies
IS-IS, verifying ...............................................................281
advertisements, displaying ..............................................524
alias option for static-host-mapping
statement...........................................................................407
alias statement.....................................................................407
authentication
algorithm
IS-IS............................................................................33
IS-IS.....................................................................................33
keychains
IS-IS............................................................................33
authentication configuration
BFD.....................................................................................119
authentication-algorithm statement
IS-IS
usage guidelines....................................................34
authentication-key statement
IS-IS...................................................................................319
usage guidelines..............................................31, 34
authentication-key-chain statement...........................320
IS-IS
usage guidelines....................................................34
authentication-type statement
IS-IS...................................................................................321
usage guidelines.....................................................31

B
backup-spf-options statement
IS-IS..................................................................................323
best routes, displaying.........................................................531

Copyright 2015, Juniper Networks, Inc.

authentication configuration....................................119
protocol...........................................................................109
sessions
clearing...................................................................420
displaying...............................................................441
BFD authentication
for IS-IS.............................................................................122
bfd-liveness-detection statement
IS-IS..................................................................................324
usage guidelines..................................................109
bfd-per-address-family
IS-IS..................................................................................324
BGP
communities
policy, routing..........................................................97
BGP (Border Gateway Protocol)
export policy for CLNS................................................241
Bidirectional Forwarding Detection See BFD
braces, in configuration statements..............................xviii
brackets
angle, in syntax descriptions...................................xviii
square, in configuration statements.....................xviii

C
checksum
for IS-IS..............................................................................39
checksum statement..........................................................326
clear bfd adaptation command......................................419
clear bfd session command............................................420
clear isis adjacency command.........................................421
clear isis database command.........................................423
clear isis overload command...........................................425
clear isis statistics command...........................................427
CLNP (Connectionless Network Protocol)......................3
CLNS (Connectionless Network Service) VPNs
BGP export policy.........................................................241
IS-IS...................................................................................241
CLNS node reachability, checking.................................429
clns-routing statement
IS-IS...................................................................................327
clns-updown-compatibility statement
IS-IS..................................................................................328
comments, in configuration statements.....................xviii
communities
policy, routing...................................................................97
community
example............................................................................98
complete sequence number PDUs, IS-IS........................6

675

IS-IS Feature Guide for Routing Devices

conditions
routing policy...................................................................511
Configuring Remote LFA Backup over LDP Tunnels
in an IS-IS Network...........................................................175
connections
testing
CLNS connections.............................................429
context-identifier
IS-Is...................................................................................329
conventions
text and syntax..............................................................xvii
credibility-protocol-preference
traffic engineering
IS-IS..........................................................................413
csn (tracing flag)..................................................................410
csn, IS-IS protocol tracing flag........................................295
csnp-interval statement...................................................330
usage guidelines..........................................................229
curly braces, in configuration statements...................xviii
customer support...................................................................xix
contacting JTAC..............................................................xix

D
default route
configuring on logical systems................................257
delay statement
IS-IS.................................................................................405
delete routing-options static route command..........277
designated router, IS-IS
about..................................................................................28
configuring election priority.......................................29
detail statement
IS-IS protocol......................................................294, 297
detection-time statement
IS-IS..................................................................................324
disable statement
IS-IS..................................................................................332
graceful restart.....................................................337
LDP synchronization..........................................333
documentation
comments on..................................................................xix
dual stacking
IS-IS...................................................................................144
dynamic overload bit, resetting for IS-IS.....................425

E
error (tracing flag)
IS-IS...................................................................................410
export route information, displaying............................556

676

export statement
IS-IS..................................................................................334
usage guidelines....................................................98
external-preference statement
IS-IS..................................................................................335

F
family statement
IS-IS..................................................................................336
usage guidelines...................................................191
FAQs
routing protocol process memory.........................301
flag statements
IS-IS protocol............................................294, 297, 299
font conventions....................................................................xvii
forwarding adjacencies
IS-IS..................................................................................205
forwarding table
route entries, displaying.............................................577

G
graceful restart......................................................................344
graceful-restart (tracing flag)
IS-IS...................................................................................410
graceful-restart statement
IS-IS...................................................................................337

H
hello
IS-IS protocol tracing flag........................................296
statement
IS-IS protocol.............................................294, 299
hello (tracing flag)
IS-IS...................................................................................410
hello packets
IS-IS.......................................................................................6
hello-authentication-key statement............................338
hello-authentication-key-chain statement...............339
hello-authentication-type statement.........................340
hello-interval statement
IS-IS...................................................................................341
hello-padding statement..................................................342
helper-disable statement
IS-IS...................................................................................337
hidden routes, displaying...................................................591
hold-time statement
IS-IS..................................................................................344
LDP synchronization..........................................345

Copyright 2015, Juniper Networks, Inc.

Index

holddown statement
IS-IS.................................................................................405
hostnames
IS-IS, displaying............................................................487

I
ignore-attached-bit statement......................................346
ignore-lsp-metrics statement
IS-IS..................................................................................347
IGP
shortcuts
overview..................................................................190
inet statement.......................................................................407
inet6 statement....................................................................407
interface statement
IS-IS..................................................................................348
interfaces
IS-IS, verifying................................................................281
ipv4-multicast statement.................................................353
usage guidelines...........................................................128
ipv4-multicast-metric statement..................................354
usage guidelines...........................................................128
IPv6
IS-IS...................................................................................144
ipv6-multicast statement.................................................355
ipv6-multicast-metric statement..................................355
ipv6-unicast statement.....................................................356
usage guidelines...........................................................150
ipv6-unicast-metric statement.......................................357
IS-IS
addresses............................................................................4
adjacency database entries, clearing
all...............................................................................421
authentication........................................31, 33, 319, 378
CSNP.......................................................................378
hello.........................................................................383
hitless keychain......................................................34
PSNP.......................................................................387
authentication keychain.................................320, 339
authentication, displaying.............................457, 666
backup coverage
displaying..............................................................459
backup MPLS LSPs.....................................................461
backup paths
SPF calculations.................................................470
backup-spf-options statement....................323, 401
BFD..........................................................................109, 324
CLNS.......................................................................327, 328

Copyright 2015, Juniper Networks, Inc.

complete sequence number


PDUs....................................................6, 229, 330, 410
configuring on logical systems......................247, 257
designated router........................................................396
disabling..........................................................................332
IPv4 multicast topology....................................128
IPv4 unicast topology........................................128
IPv6 multicast topology....................................128
IPv6 unicast topology........................................150
dual stacking..................................................................144
dynamic overload bit, resetting.............................425
enabling..........................................................................358
errored packets.............................................................410
graceful restart..............................................................337
hello
interval.....................................................................341
packet authentication......................................340
packet authentication key..............................338
PDUs...................................................................6, 410
hold time........................................................................344
hold-down timer
disabling..................................................................377
hostname database, displaying............................487
interfaces........................................................................348
interfaces, displaying.................................................489
IP fast reroute.......................................................159, 163
IPv4 unicast topology................................................388
IPv6 unicast topology......................................356, 387
label-switched path...................................................359
LDP synchronization...........................................217, 333
hold time................................................................345
level properties
global.......................................................................361
interfaces...............................................................363
link protection.................................................................161
link-protection statement.......................................364
link-state database entries
clearing...................................................................423
displaying...............................................................475
link-state PDUs........................................................6, 410
interval..........................................................224, 366
lifetime....................................................................367
tracing......................................................................410
loop-free alternate routes................................159, 163
loose authentication...........................................33, 364
mesh groups.........................................................234, 372
metrics............................................................................400
IPv6...........................................................................357
multicast......................................................354, 355

677

IS-IS Feature Guide for Routing Devices

normal.....................................................................373
traffic engineering..............................................408
wide.................................................................213, 416
multicast topologies........................127, 128, 353, 355
IPv4..........................................................................383
IPv6..........................................................................385
multilevel..........................................................................20
neighbors, displaying.................................................450
network PDUs....................................................................4
no-eligible-backup statement...............................382
node link protection............................................162, 381
NSAP.....................................................................................4
overloaded, marking router as...............................389
padding...........................................................................342
partial sequence number PDUs........................6, 410
PDUs......................................................................................6
point-to-point interface............................................393
policy, routing........................................................98, 334
preferences..................................................98, 335, 394
prefix limit......................................................................395
redistributing OSPF routes into................................83
remote-backup
IPv4..........................................................................382
route tagging..................................................................107
routes, displaying.........................................................497
routing domains...........................................................363
RSVP LSP backup paths...........................................162
SPF calculations, displaying....................................501
SPF delay calculations...............................................410
supported software standards...................................8
topology.........................................................................409
tracing operations........................................................410
traffic engineering support...........191, 332, 404, 413
traffic statistics
clearing....................................................................427
displaying..............................................................506
wide metrics...................................................................213
IS-IS (Intermediate System-to-Intermediate
System)
about designated routers...........................................28
BFD authentication......................................................122
checksum..........................................................................39
configuring.........................................................................14
configuring designated router election
priority............................................................................29
for CLNS route exchange...........................................241

678

IS-IS protocol........................................................................290
adjacencies
status......................................................................293
verifying ..................................................................281
broken network topology, figure ............................279
configuration
Level 1 router .......................................................290
Level 1/Level 2 router .......................................288
Level 2 router .......................................................292
configuration, verifying..............................................282
detail statement................................................294, 297
displaying details.........................................................294
flag statement..........................................294, 297, 299
hello statement...........................................................299
interfaces, verifying .....................................................281
link-state PDUs
analyzing in detail...............................................297
lsp statement................................................................297
network topology
detailed figure......................................................288
figure ......................................................................294
levels, figure .........................................................287
receive statement.......................................................299
run show isis interface command.........................289
run show log command..................................295, 299
send statement...........................................................299
set flag command...................................294, 297, 299
show configuration protocols isis
command...................................................................282
show isis adjacency command...............................281
show isis interface command .................................281
show mpls lsp extensive command..........280, 284
trace messages............................................................294
tracing
configuring............................................................298
flags, table.............................................................295
verifying...........................................................................279
isis statement........................................................................358
ISO
addresses............................................................................4
system identifier...............................................................4

K
keychain
IS-IS.....................................................................................33

Copyright 2015, Juniper Networks, Inc.

Index

L
label-switched-path statement
IS-IS..................................................................................359
usage guidelines.................................................205
ldp-synchronization statement
IS-IS.................................................................................360
usage guidelines...................................................217
level statement
IS-IS
interfaces...............................................................363
protocol...................................................................361
usage guidelines.............................................................20
link-protection statement
IS-IS..........................................................................161, 364
link-state PDUs..........................................................................6
link-state PDUs, analyzing IS-IS.....................................297
logical systems
configuring default route...........................................257
configuring IS-IS..................................................247, 257
configuring routing policy.........................................257
overview..........................................................................245
loose-authentication-check statement
IS-IS..................................................................................364
usage guidelines.............................................................33
lsp
IS-IS protocol
statement .............................................................297
tracing flag............................................................296
lsp (tracing flag)....................................................................410
lsp-equal-cost statement................................................365
lsp-generation (tracing flag)............................................410
lsp-generation, IS-IS protocol tracing flag.................296
lsp-interval statement.......................................................366
usage guidelines...........................................................224
lsp-lifetime statement........................................................367
LSPs
IGP shortcuts.................................................................190

M
manuals
comments on..................................................................xix
max-areas statement........................................................368
max-hello-size statement................................................369
max-lsp-size statement....................................................370
max-snp-size statement....................................................371
mesh groups.................................................................234, 372
mesh-group statement......................................................372
usage guidelines..........................................................234

Copyright 2015, Juniper Networks, Inc.

metric statement
IS-IS...................................................................................373
metrics
IS-IS.................................................................................400
minimum-interval statement
IS-IS..................................................................................324
minimum-receive-interval statement
IS-IS..................................................................................324
usage guidelines..................................................109
multicast-rpf-routes statement.....................................374
multilevel IS-IS........................................................................20
multipath statement
IS-IS...................................................................................375
multiplier statement
IS-IS..................................................................................324
usage guidelines..................................................109

N
network PDUs.............................................................................4
network service access point................................................4
network topology
IS-IS protocol, detailed figure................................288
IS-IS protocol, figure..................................................293
levels IS-IS protocol, figure......................................287
next hops
routes sent to, displaying.........................................606
no-adaptation statement
BFD (IS-IS)
usage guidelines..................................................109
IS-IS..................................................................................324
no-adjacency-down-notification statement
IS-IS..................................................................................376
no-adjacency-holddown statement.............................377
no-authentication-check statement............................378
usage guidelines..............................................................31
no-csnp-authentication statement..............................378
usage guidelines..............................................................31
no-eligible-backup statement
IS-IS..................................................................................382
no-eligible-remote-backup statement.......................382
no-hello-authentication statement..............................383
usage guidelines..............................................................31
no-ipv4-multicast statement..........................................383
no-ipv4-routing statement..............................................384
no-ipv6-multicast statement.........................................385
no-ipv6-routing statement..............................................386
no-ipv6-unicast statement..............................................387
no-psnp-authentication statement..............................387
usage guidelines..............................................................31

679

IS-IS Feature Guide for Routing Devices

no-unicast-topology statement....................................388
node-link-protection statement.....................................381
usage guidelines
IS-IS..........................................................................162
NPDUs...........................................................................................4
NSAP..............................................................................................4

O
OSPF
redistributing routes into IS-IS..................................83
overload bit, resetting for IS-IS.......................................425
overload statement
IS-IS..................................................................................389

P
packets
IS-IS protocol tracing flag........................................296
received...........................................................................298
sent...................................................................................298
packets (tracing flag)
IS-IS...................................................................................410
parentheses, in syntax descriptions..............................xviii
partial sequence number PDUs..........................................6
passive statement
IS-IS..................................................................................392
PDUs..............................................................................................6
ping clns command............................................................429
ping command
network
problems, identifying.........................................275
problems, identifying solutions.....................278
point-to-point statement.................................................393
policy, routing
communities....................................................................97
framework........................................................................43
IS-IS..........................................................................98, 334
overview.............................................................................43
preference statement
IS-IS..................................................................................394
preferences
IS-IS........................................................................335, 394
prefix limit
IS-IS..................................................................................395
prefix-export-limit statement
IS-IS..................................................................................395
priority statement
IS-IS..................................................................................396
processes
restarting..........................................................................431

680

protocols statement............................................................397
psn (tracing flag)..................................................................410
psn, IS-IS protocol tracing flag.......................................296
PSNP IS-IS...................................................................................6

R
rapid-runs statement
IS-IS.................................................................................405
receive statements
IS-IS protocol................................................................299
redistributing routes
OSPF into IS-IS...............................................................83
reference-bandwidth statement
IS-IS.................................................................................400
Remote LFA for LDP Tunnels in IS-IS.............................174
remote-backup-calculation statement
IS-IS...................................................................................401
restart command..................................................................431
restart-duration statement
IS-IS...................................................................................337
restarting
software processes.....................................................431
RFC 3719, Recommendations for Interoperable
Networks using Intermediate System to
Intermediate System (IS-IS)............................................8
rib-group statement
IS-IS..................................................................................402
route advertisements, displaying...................................524
route, displaying
next-hop........................................................................606
routers
configuration
IS-IS protocol ......................................................290
Level 1 IS-IS, configuring...........................................290
Level 1/Level 2 IS-IS, configuring...........................288
Level 2 IS-IS, configuring..........................................292
routes, displaying
active.................................................................................513
active path......................................................................519
advertising protocol....................................................524
all.......................................................................................529
best....................................................................................531
brief information..........................................................534
detailed information..................................................536
extensive information................................................559
hidden...............................................................................591
in a specific routing table.........................................638
in the forwarding table...............................................577
inactive path.................................................................594

Copyright 2015, Juniper Networks, Inc.

Index

instances........................................................................598
learned from a specific protocol.............................617
matching the specified address............................554
policy-based route export.......................................556
received through a neighbor...................................629
sent to a specific interface........................................612
terse information.........................................................663
routing policies
BGP export, for CLNS..................................................241
displaying.......................................................................509
testing the configuration for...................................669
routing policy See policy, routing
configuring on logical systems................................257
routing protocol process memory
FAQs..................................................................................301
routing-instances statement..........................................403
run show isis interface command.............289, 290, 292
run show log command
IS-IS protocol ...........................................295, 297, 299

S
send statement
IS-IS protocol................................................................299
set flag command
IS-IS protocol ...........................................294, 297, 299
set flag hello detail command .......................................294
set flag hello send command ........................................299
set flag lsp detail command ............................................297
shortcuts statement
IS-IS.................................................................................404
usage guidelines...................................................191
shortest path first.................................................................501
show bfd session command............................................441
show configuration command........................................276
show configuration protocols isis command ...........282
show isis adjacency brief command................................18
show isis adjacency command ............................281, 450
show isis adjacency extensive command......................18
explanation.......................................................................19
show isis authentication command..............................457
show isis backup coverage...............................................459
show isis backup spf results............................................470
show isis context-identifier command.........................473
show isis database command.........................................475
show isis hostname command.......................................487
show isis interface command......................238, 281, 489
show isis overview command.........................................493
show isis route command.................................................497
show isis spf command......................................................501

Copyright 2015, Juniper Networks, Inc.

show isis statistics command...............................239, 506


show isis-backup label-switched-path
command............................................................................461
show log command................................................................41
show mpls lsp extensive command
IS-IS protocol ....................................................280, 284
show policy command......................................................509
show policy conditions command...................................511
show route active-path command................................519
show route advertising-protocol command..............524
show route all command..................................................529
show route best command...............................................531
show route brief command..............................................534
show route command.............................275, 277, 278, 513
show route detail command...........................................536
show route exact command............................................554
show route export command..........................................556
show route extensive command....................................559
show route forwarding-table command.....................577
show route hidden command..........................................591
show route inactive-path command............................594
show route instance command.....................................598
show route next-hop command...................................606
show route output command..........................................612
show route protocol command.......................................617
show route receive-protocol command.....................629
show route table command............................................638
show route terse command.............................................663
show security keychain command...............................666
show bfd session extensive command.........................125
show isis interface brief command...................................17
show isis interface detail command.................................17
explanation........................................................................17
spf
IS-IS protocol tracing flag........................................296
spf (tracing flag)
IS-IS...................................................................................410
spf-options statement
IS-IS.................................................................................405
static-host-mapping statement....................................407
usage guidelines.............................................................29
support, technical See technical support
syntax conventions...............................................................xvii
sysid statement....................................................................407
usage guidelines.............................................................29
system identifier........................................................................4
system identifier, IS-IS
configuring........................................................................29

681

IS-IS Feature Guide for Routing Devices

T
te-metric statement
IS-IS.................................................................................408
technical support
contacting JTAC..............................................................xix
test policy command.........................................................669
threshold statement
IS-IS..................................................................................324
usage guidelines..................................................109
topologies statement........................................................409
traceoptions statement
IS-IS...................................................................................410
routing protocols
description.............................................................267
traceroute clns command..................................................671
traceroute command
identifying solutions to network
problems.....................................................................278
network problems, identifying................................275
tracing flags
csn.....................................................................................410
error
IS-IS..........................................................................410
graceful restart
IS-IS..........................................................................410
hello
IS-IS..........................................................................410
IS-IS protocol, table ..................................................295
lsp......................................................................................410
lsp-generation...............................................................410
packets
IS-IS..........................................................................410
psn.....................................................................................410
spf
IS-IS..........................................................................410
tracing operations
IS-IS...................................................................................410
routing protocols..........................................................267
traffic engineering
IGP shortcuts.................................................................190
traffic-engineering statement
IS-IS...................................................................................413
usage guidelines...................................................191
transmit-interval statement
IS-IS..................................................................................324
troubleshooting.....................................................................301
checklist for problems on your network..............273
commands for problems on your network.........273
evaluate the solution..................................................277

682

identify the symptoms...............................................275


isolate a broken network connection...................274
isolate the causes........................................................276
network problems, checklist ...................................273
problems diagnosing, figure.....................................274
take appropriate action..............................................277
topology with a problem, figure.............................274
working with problems on your network.............273

V
verification
BFD for IS-IS....................................................................115
IS-IS policy......................................................................261
multicast topology for IS-IS......................................133
tracing..............................................................................270
version statement
IS-IS..................................................................................324
usage guidelines..................................................109

W
wide-metrics-only statement..........................................416
usage guidelines............................................................213

Copyright 2015, Juniper Networks, Inc.

Вам также может понравиться